Knowledge (XXG)

Spamming

Source 📝

971:
over just eight percent or fewer of the total available hosting registrars and autonomous systems, with 80 percent of spam programs overall being distributed over just 20 percent of all registrars and autonomous systems; 2) of the 76 purchases for which the researchers received transaction information, there were only 13 distinct banks acting as credit card acquirers and only three banks provided the payment servicing for 95 percent of the spam-advertised goods in the study; and, 3) a "financial blacklist" of banking entities that do business with spammers would dramatically reduce monetization of unwanted e-mails. Moreover, this blacklist could be updated far more rapidly than spammers could acquire new banking resources, an asymmetry favoring anti-spam efforts.
137: 827:'s Internal Market Commission estimated in 2001 that "junk email" cost Internet users €10 billion per year worldwide. The California legislature found that spam cost United States organizations alone more than $ 13 billion in 2007, including lost productivity and the additional equipment, software, and manpower needed to combat the problem. Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages. Large companies who are frequent spam targets utilize numerous techniques to detect and prevent spam. 612:. This is nearly identical to telemarketing calls over traditional phone lines. When the user chooses to receive the spam call, a pre-recorded spam message or advertisement is usually played back. This is generally easier for the spammer as VoIP services are cheap and easy to anonymize over the Internet, and there are many options for sending mass number of calls from a single location. Accounts or IP addresses being used for VoIP spam can usually be identified by a large number of outgoing calls, low call completion and short call length. 1260: 192:, who would repeat "Spam" a huge number of times to scroll other users' text off the screen. In early chat-room services like PeopleLink and the early days of Online America (later known as America Online or AOL), they actually flooded the screen with quotes from the Monty Python sketch. This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue. It was also used to prevent members of rival groups from chatting—for instance, 847:
a sufficient conversion rate to keep the spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business. Finally, new spammers go into business every day, and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable.
369:
exponentially over the following years, and by 2007 it constituted about 80% to 85% of all e-mail, by a conservative estimate. Pressure to make email spam illegal has resulted in legislation in some jurisdictions, but less so in others. The efforts taken by governing bodies, security systems and email service providers seem to be helping to reduce the volume of email spam. According to "2014 Internet Security Threat Report, Volume 19" published by
530: 475:
that account owner follows the spammer back, it legitimizes the spammer. Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.
3859: 31: 563:, offensive, or simply on-screen text of a link to the site being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (though the survey, and the archive file itself, is worthless and does not contain the file in question at all), or in extreme cases, 456:. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether. 1162:, Nigeria, the previous November. Fiedler shipped out $ 609,000 fake check and money orders when arrested and prepared to send additional $ 1.1 million counterfeit materials. Also, the U.S. Postal Service recently intercepted counterfeit checks, lottery tickets and eBay overpayment schemes with a value of $ 2.1 billion. 1209:
that it may be responsible for sending billions of illegal spam messages. The US District Court froze the defendants' assets to preserve them for consumer redress pending trial. U.S. co-defendant Jody Smith forfeited more than $ 800,000 and faces up to five years in prison for charges to which he pleaded guilty.
1031:
Earthlink won a $ 25 million judgment against one of the most notorious and active "spammers" Khan C. Smith in 2001 for his role in founding the modern spam industry which dealt billions in economic damage and established thousands of spammers into the industry. His email efforts were said to make up
846:
to the entire email system, as operated in the past. Since email is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny percentage of their targets are motivated to purchase their products (or fall victim to their scams), the low cost may provide
1190:
In January 2007, a Sheriff Court in Scotland awarded Mr. Gordon Dick £750 (the then maximum sum that could be awarded in a Small Claim action) plus expenses of £618.66, a total of £1368.66 against Transcom Internet Services Ltd. for breaching anti-spam laws. Transcom had been legally represented at
970:
In an attempt to assess potential legal and technical strategies for stopping illegal spam, a study cataloged three months of online spam data and researched website naming and hosting infrastructures. The study concluded that: 1) half of all spam programs have their domains and servers distributed
459:
Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications. These can be a result of allowing websites which are malicious or delivering
425:
Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates e-mail spam. Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a message (or substantially similar messages). The prevalence of
1208:
and courier Roland Smits, after raids in Christchurch. This marked the first prosecution since the Unsolicited Electronic Messages Act (UEMA) was passed in September 2007. The FTC said it had received more than three million complaints about spam messages connected to this operation, and estimated
341:
Within a few years, the focus of spamming (and anti-spam efforts) moved chiefly to email, where it remains today. By 1999, Khan C. Smith, a well known hacker at the time, had begun to commercialize the bulk email industry and rallied thousands into the business by building more friendly bulk email
474:
Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when
1221:
is the first and only country to legalize it. According to the Bulgarian E-Commerce act (Чл.5,6) anyone can send spam to mailboxes published as owned by a company or organization as long as there is a "clear and straight indication that the message is unsolicited commercial e-mail" ("да осигури
834:
is significant: "The secondary consequence of spamming is that search engine indexes are inundated with useless pages, increasing the cost of each processed query". The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media
651:
Spamming in mobile app stores include (i) apps that were automatically generated and as a result do not have any specific functionality or a meaningful description; (ii) multiple instances of the same app being published to obtain increased visibility in the app market; and (iii) apps that make
116:
Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and
368:
Email spam, also known as unsolicited bulk email (UBE), or junk mail, is the practice of sending unwanted email messages, frequently with commercial content, in large quantities. Spam in email started to become a problem when the Internet was opened for commercial use in the mid-1990s. It grew
1225:
This made lawsuits against Bulgarian ISP's and public e-mail providers with antispam policy possible, as they are obstructing legal commerce activity and thus violate Bulgarian antitrust acts. While there are no such lawsuits until now, several cases of spam obstruction are currently awaiting
1203:
In October 2008, an international internet spam operation run from New Zealand was cited by American authorities as one of the world's largest, and for a time responsible for up to a third of all unwanted e-mails. In a statement the US Federal Trade Commission (FTC) named Christchurch's Lance
1011:
to successfully sue Eric Head who settled the lawsuit for several thousand U.S. dollars in June 2004. But the law is criticized by many for not being effective enough. Indeed, the law was supported by some spammers and organizations that support spamming, and opposed by many in the anti-spam
433:
Forum spam is the creation of advertising messages on Internet forums. It is generally done by automated spambots. Most forum spam consists of links to external sites, with the dual goals of increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals,
1194:
Despite the statutory tort that is created by the Regulations implementing the EC Directive, few other people have followed their example. As the Courts engage in active case management, such cases would probably now be expected to be settled by mediation and payment of nominal damages.
380:
is dedicated to collecting email addresses and selling compiled databases. Some of these address-harvesting approaches rely on users not reading the fine print of agreements, resulting in their agreeing to send messages indiscriminately to their contacts. This is a common approach in
483:
Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.
537:
claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description. If the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look
987:
has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge. These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools that (either through error or design) also
215:
to mean excessive multiple posting—the repeated posting of the same message. The unwanted message would appear in many, if not all newsgroups, just as Spam appeared in all the menu items in the Monty Python sketch. One of the earliest people to use "spam" in this sense was
273:
on May 3, 1978. Rather than send a separate message to each person, which was the standard practice at the time, he had an assistant, Carl Gartley, write a single mass email. Reaction from the net community was fiercely negative, but the spam did generate some sales.
1171:, 575 F.3d 1040, the Ninth Circuit assessed the standing requirements necessary for a private plaintiff to bring a civil cause of action against spam senders under the CAN-SPAM Act of 2003, as well as the scope of the CAN-SPAM Act's federal preemption clause. 1604:
Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005 in The 14th International World Wide Web Conference (WWW 2005) May 10, (Tue) – 14 (Sat), 2005, Nippon Convention Center (Makuhari Messe), Chiba,
256:
allowed telegraphic messages on its network to be sent to multiple destinations. The first recorded instance of a mass unsolicited commercial telegram is from May 1864, when some British politicians received an unsolicited telegram advertising a dentist.
911:
is the total expected profit from spam, which may include any combination of the commercial and non-commercial reasons listed above. It is normally linear, based on the incremental benefit of reaching each additional spam recipient, combined with the
434:
gambling, pornography, real estate or loans, and generating more traffic for these commercial websites. Some of these links contain code to track the spambot's identity; if a sale goes through, the spammer behind the spambot earns a commission.
228:, which had previously only defined "spam" in relation to the trademarked food product, added a second definition to its entry for "spam": "Irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users." 842:: spammers use resources (both physical and human), without bearing the entire cost of those resources. In fact, spammers commonly do not bear the cost at all. This raises the costs for everyone. In some ways spam is even a potential 1229:
The law contains other dubious provisions — for example, the creation of a nationwide public electronic register of e-mail addresses that do not want to receive spam. It is usually abused as the perfect source for
1191:
earlier hearings, but were not represented at the proof, so Gordon Dick got his decree by default. It is the largest amount awarded in compensation in the United Kingdom since Roberts v Media Logistics case in 2005.
1069:
lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a
542:
In actual video spam, the uploaded video is given a name and description with a popular figure or event that is likely to draw attention, or within the video a certain image is timed to come up as the video's
2666: 2524: 1139:, and a $ 1.1 million penalty if spamming were to continue, the $ 50,000 was not paid, or the financial statements provided were found to be inaccurate. The spamming operation was successfully shut down. 643:
are not capable of identifying spam attacks. The researchers manipulated the citation counts of articles, and managed to make Google Scholar index complete fake articles, some containing advertising.
3102: 1038:
and Cyber Promotions were the target of a string of lawsuits, many of which were settled out of court, up through a 1998 Earthlink settlement that put Cyber Promotions out of business. Attorney
992:
non-spam e-mail from sites seen as "spam-friendly". Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use that draws fire.
3276: 3250: 2126: 959:, was arrested by US authorities on May 31, 2007. Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, 815:
luncheon meat, does not object to the Internet use of the term "spamming". However, they did ask that the capitalized word "Spam" be reserved to refer to their product and trademark.
300:
spam", after the subject line of the postings. Defiant in the face of widespread condemnation, the attorneys claimed their detractors were hypocrites or "zealots", claimed they had a
1081:
In June 2007, two men were convicted of eight counts stemming from sending millions of e-mail spam messages that included hardcore pornographic images. Jeffrey A. Kilbride, 41, of
967:
to distribute spam during 2003. This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.
2245: 1204:
Atkinson as one of the principals of the operation. New Zealand's Internal Affairs announced it had lodged a $ 200,000 claim in the High Court against Atkinson and his brother
2268: 3306: 2192: 1976: 407:
systems. Although less prevalent than its e-mail counterpart, according to a report from Ferris Research, 500 million spam IMs were sent in 2003, twice the level of 2002.
876:
Overhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/blog spam tool, taking over or acquiring a host/zombie, etc.
2914: 2474: 1154:
in an Internet $ 1 million "Nigerian check scam." She conspired to commit bank, wire and mail fraud, against US citizens, specifically using Internet by having had an
948:). Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them (e.g., 3753: 2662: 2405: 2521: 2620: 620: 177:, has a waitress reading out a menu where every item but one includes the Spam canned luncheon meat. As the waitress recites the Spam-filled menu, a chorus of 2488: 3649:
Brown, Bruce Cameron "How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer" Atlantic Publishing Group, 2011.
3433: 2943: 2055:
Ahmad, Adnan; Azhar, Anique; Naqvi, Sajid; Nawaz, Asif; Arshad, Samia; Zeshan, Furkh; Yousif, Mohammed; Salih, Ali O. M. (2020-03-04). Farouk, Ahmed (ed.).
2520:
Joeran Beel and Bela Gipp. Academic search engine spam and google scholar's resilience against it. Journal of Electronic Publishing, 13(3), December 2010.
2749: 2219: 3122:
U.S. v Jason Smathers and Sean Dunaway, amended complaint, US District Court for the Southern District of New York (2003). Retrieved 7 March 2007, from
920:-generated spam has recently been measured to be around one in 12,000,000 for pharmaceutical spam and one in 200,000 for infection sites as used by the 3659:
Dunne, Robert "Computers and the law: an introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009.
3094: 4297: 2641: 924:. The authors of the study calculating those conversion rates noted, "After 26 days, and almost 350 million e-mail messages, only 28 sales resulted." 882:: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients (see 1885: 1711: 220:. This use had also become established—to "spam" Usenet was to flood newsgroups with junk messages. The word was also attributed to the flood of " 3606: 3233: 304:
right to send unwanted commercial messages, and labeled their opponents "anti-commerce radicals". The couple wrote a controversial book entitled
3280: 3254: 3072: 672:
E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political.
636: 521:, both of which accept user contributions. Another possible form of spam in blogs is the spamming of a certain tag on websites such as Tumblr. 4515: 4274: 3664: 3654: 3644: 2999: 2352: 2133: 1612: 1226:
decision in the Bulgarian Antitrust Commission (Комисия за защита на конкуренцията) and can end with serious fines for the ISPs in question.
547:
image to mislead the viewer, such as a still image from a feature film, purporting to be a part-by-part piece of a movie being pirated, e.g.
297: 3703: 1798: 2287: 509:
by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site. Similar
4741: 4555: 4305: 3203: 3154: 2007: 1915: 1347: 1114: 2429: 2241: 2102: 1117:. The specific law that prosecutors used under the CAN-Spam Act was designed to crack down on the transmission of pornography in spam. 4530: 4343: 3746: 3207: 1021: 632: 265:
The earliest documented spam (although the term had not yet been coined) was a message advertising the availability of a new model of
1093:, and ordered to forfeit more than $ 1.1 million, the amount of illegal proceeds from their spamming operation. The charges included 1062:. In 2003, he sold a list of approximately 93 million AOL subscriber e-mail addresses to Sean Dunaway who sold the list to spammers. 4237: 285: 3726: 3128: 2265: 3382: 2184: 2032: 1968: 1856: 684:
and e-mail media with preaching messages. A growing number of criminals are also using spam to perpetrate various sorts of fraud.
4033: 3302: 3013: 225: 4287: 2838: 2818: 1824: 169: 121:, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions. 2770: 2924: 2311: 1765: 1535: 984: 980: 2716: 3688: 1941: 1618: 136: 4731: 4721: 4100: 3739: 1739: 266: 148:" sketch, from where the term is derived. Spam is included in almost every dish to the annoyance and dismay of a customer. 3490: 2056: 1506: 995:
Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against
4510: 4392: 2541: 1643: 2397: 4292: 4213: 4013: 3464: 3045: 609: 2617: 1564: 2691: 57:), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is 4550: 4269: 4227: 3883: 3544: 3519: 3408: 3353: 1592: 1443: 1244: 1167: 1089:, was sentenced to 63 months. In addition, the two were fined $ 100,000, ordered to pay $ 77,500 in restitution to 850:
Some companies and groups "rank" spammers; spammers who make the news are sometimes referred to by these rankings.
235:
to too many newsgroups at once, as opposed to those that were posted too frequently, were called "velveeta" (after
181:
patrons drown out all conversations with a song, repeating "Spam, Spam, Spam, Spam… Lovely Spam! Wonderful Spam!".
110: 2496: 859: 4736: 4130: 3848: 3429: 3178: 2939: 1330: 1231: 118: 2892: 2741: 1686: 4726: 4525: 4422: 4387: 4115: 3993: 3888: 2468: 2215: 1125: 1086: 937: 808: 377: 2454:
and Marcos Gonçalves (July 2009). "Detecting Spammers and Content Promoters in Online Video Social Networks".
858:
In all cases listed above, including both commercial and non-commercial, "spam happens" because of a positive
1131:
for violating the Florida Electronic Mail Communications Act. The two spammers were required to pay $ 50,000
19:
This article is about unsolicited or undesirable electronic messages. For information specific to email, see
4203: 4155: 3818: 3228: 2637: 1234:, because publishing invalid or incorrect information in such a register is a criminal offense in Bulgaria. 1043: 576: 284:
The first major commercial spam incident started on March 5, 1994, when a husband and wife team of lawyers,
575:, though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a 4360: 4336: 2977: 839: 382: 312: 113:
about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.
82: 3565: 3359: 1877: 4244: 3978: 2860: 335: 185: 24: 3596: 1707: 1078:
against him. The judgment includes a statutory damages award of about $ 10 million under Oklahoma law.
342:
software and providing internet access illegally hacked from major ISPs such as Earthlink and Botnets.
2455: 1259: 4565: 4535: 4502: 4264: 4176: 4125: 4070: 3938: 3911: 3893: 3858: 3791: 3762: 2737: 2162: 1448: 1363: 1286: 1110: 1059: 1004: 628: 3068: 2982: 1588: 1222:ясното и недвусмислено разпознаване на търговското съобщение като непоискано") in the message body. 963:, aggravated identity theft, and money laundering. Prosecutors allege that Soloway used millions of 505:. In 2003, this type of spam took advantage of the open nature of comments in the blogging software 4716: 4711: 4540: 4382: 4048: 3823: 3781: 2663:"Data protection: "Junk" email costs internet users 10 billion a year worldwide – Commission study" 1143: 956: 624: 157: 145: 3148:
Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN. Retrieved 7 March 2007, from
2859:
Kanich, C.; C. Kreibich; K. Levchenko; B. Enright; G. Voelker; V. Paxson; S. Savage (2008-10-28).
4232: 4160: 4065: 3005: 2600: 2580: 2561: 2451: 2370: 2358: 2084: 1790: 1671:"RFC 2635 - DON\x27T SPEW A Set of Guidelines for Mass Unsolicited Mailings and Postings (spam*)" 1147: 1094: 1082: 580: 510: 278: 189: 2284: 4706: 4520: 4463: 4329: 4280: 4038: 3973: 3923: 3870: 3828: 3776: 3660: 3650: 3640: 2995: 2348: 2335:
Gupta, Arushi; Kaushal, Rishabh (2015). "Improving spam detection in Online Social Networks".
2076: 1999: 1907: 1608: 1475: 1003:, some laws specifically targeting spam have been proposed. In 2004, United States passed the 945: 843: 831: 443: 404: 231:
There was also an effort to differentiate between types of newsgroup spam. Messages that were
86: 3150: 2426: 2029: 4661: 4608: 4249: 4189: 3953: 3943: 3838: 3566:"Регистър на юридическите лица, които не желаят да получават непоискани търговски съобщения" 3199: 2987: 2796: 2592: 2553: 2340: 2159:"FileOn List Builder-Extract URL, MetaTags, Email, Phone, Fax from www-Optimized Webcrawler" 2109: 2068: 1678: 1398: 1319: 1313: 1304: 1280: 1102: 1071: 1000: 989: 894: 879: 346: 3715: 559:, or something similar. The actual content of the video ends up being totally unrelated, a 4673: 4643: 4377: 4140: 4120: 3843: 3833: 3487:"Court Orders Australia-based Leader of International Spam Network to Pay $ 15.15 Million" 3182: 2919: 2822: 2624: 2528: 2433: 2382: 2291: 2272: 1431: 1425: 1274: 1265: 1184: 1150:
court and was sentenced to two years imprisonment and five years of supervised release or
1047: 1039: 1035: 964: 913: 427: 221: 3124: 1109:
materials. The trial, which began on June 5, was the first to include charges under the
529: 4683: 4653: 4603: 4545: 4468: 4458: 4402: 4310: 4208: 4058: 4008: 3983: 3948: 3928: 3808: 3796: 3601: 3372: 2966: 1846: 1416: 1403: 1292: 1205: 1121: 1066: 1055: 1051: 941: 933: 901: 824: 640: 449: 416: 398: 370: 349:; spammers began using automatic translation services to send spam in other languages. 174: 66: 62: 696:. They provided a report that shows spam volume originating from countries worldwide. 4700: 4618: 4583: 4483: 4417: 4220: 4181: 4150: 4145: 3998: 3988: 3958: 3327: 3237: 2337:
2015 International Conference on Cognitive Computing and Information Processing(CCIP)
2088: 2036: 1180: 1128: 693: 584: 493: 253: 160: 74: 50: 4321: 3683: 3009: 2834: 2815: 2604: 2362: 1820: 4666: 4623: 4593: 4443: 4254: 4110: 3813: 3486: 2565: 2304: 1187:
won £270 against Media Logistics UK who sent junk e-mails to his personal account.
960: 921: 673: 506: 453: 232: 184:
In the 1980s the term was adopted to describe certain abusive users who frequented
141: 30: 1761: 652:
excessive use of unrelated keywords to attract users through unintended searches.
3636: 1527: 900:
Damage: Impact on the community and/or communication channels being spammed (see
4628: 4438: 4194: 4028: 4003: 3968: 3803: 3709: 3459: 2745: 2712: 1937: 1850: 1596: 1369: 1341: 863: 812: 676:, for instance, spammed Usenet with historical revisionist screeds. A number of 572: 568: 469: 331: 327: 315: 301: 293: 106: 102: 98: 46: 1735: 1498: 4598: 4575: 4448: 4407: 4369: 4259: 4075: 4023: 3906: 3786: 2596: 2344: 1649: 1298: 1255: 1155: 1075: 677: 664:-enabled devices, is another form of spam that has developed in recent years. 556: 420: 363: 90: 70: 58: 20: 2242:"Is this website allowed to send you notifications? NO! - caution is advised" 2080: 1395: – Posting a flood of articles to a Usenet group, with falsified headers 4633: 4613: 4488: 4135: 4090: 4085: 3933: 3901: 3404: 3200:"Two Men Sentenced for Running International Pornographic Spamming Business" 1374: 1151: 1106: 661: 601: 596: 544: 518: 498: 217: 200: 194: 78: 3632:(MIT Press; 2013) 304 pages; $ 27.95). A cultural and technological history 3454: 3037: 1556: 4678: 4588: 4473: 4453: 4053: 3916: 3377: 3328:"Woman Gets Two Years for Aiding Nigerian Internet Check Scam (PC World)" 2687: 1392: 1335: 1277: – Privacy technique to cloak e-mail addresses (avoidance technique) 1218: 1032:
more than a third of all Internet email being sent from 1999 until 2002.
996: 949: 560: 236: 94: 54: 3540: 3511: 2801: 2542:"Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis" 2072: 4560: 4478: 4412: 4105: 4080: 4043: 3731: 2991: 2868:
Proceedings of Conference on Computer and Communications Security (CCS)
1383: 1357: 1324: 1136: 890: 889:
Risks: Chance and severity of legal and/or public reactions, including
883: 639:
demonstrated that most (web-based) academic search engines, especially
564: 534: 386: 270: 224:" messages that clogged many newsgroups during the 1990s. In 1998, the 41:
is the use of messaging systems to send multiple unsolicited messages (
3175: 2285:
Understanding and Combating Link Farming in the Twitter Social Network
1499:"Developer Policy Center – Intellectual Property, Deception, and Spam" 4018: 3963: 3878: 1682: 1670: 1008: 917: 681: 552: 319: 289: 281:
games, to fill their rivals' accounts with unwanted electronic junk.
212: 178: 3699:
Federal Trade Commission page with spam reduction tips and reporting
3693: 2581:"'Spam, spam, spam, spam … Lovely spam!' Why is Bluespam different?" 2557: 1316: – Distribution of advertising by direct mail or letterbox drop 1085:
was sentenced to six years in prison, and James R. Schaffer, 41, of
330:. However, as it was a violation of their terms of service, the ISP 4638: 4397: 3720: 3187:
U.S. District Court - Western District of Oklahoma (Oklahoma City)
2041: 1159: 1098: 528: 135: 29: 2967:"Click Trajectories: End-to-End Analysis of the Spam Value Chain" 2861:"Spamalytics: An Empirical Analysis of Spam Marketing Conversion" 571:-like format selling their product which feature actors and paid 3095:"On the dark side of the planet temperatures average 110amp160K" 605: 514: 502: 326:
attempting to raise funds to rescue children at risk during the
4325: 3735: 1046:
in 1997 for sending prodigious amounts of spam advertising his
1007:
that provided ISPs with tools to combat spam. This act allowed
45:) to large numbers of recipients for the purpose of commercial 3673:, 2014-15 (including 2008–2013) over 35,000 spam emails listed 3569: 3277:"Crist: Judgment Ends Duo's Illegal Spam, Internet Operations" 2787:
Rao, Justin M.; Reiley, David H. (2012), "Economics of Spam",
1132: 1090: 345:
By 2009 the majority of spam sent around the World was in the
323: 164: 3857: 3698: 2266:"Marketers need to build trust as spam hits social networks" 2030:
Spammers go multilingual, use automatic translation services
1406:, also known as vishing – Phishing attack via telephony 1217:
While most countries either outlaw or at least ignore spam,
1158:
who shipped counterfeit checks and money orders to her from
204:
chat rooms, filling the space with blocks of text until the
3670: 3712:
Overview and text of the first known internet e-mail spam.
3706:
BitDefender's weekly report on spam trends and techniques.
3637:"Inside the spam cartel: trade secrets from the dark side" 2158: 1354:) – List of e-mail servers suspected of enabling spam 277:
Spamming had been practiced as a prank by participants in
16:
Unsolicited electronic messages, especially advertisements
3723:: a peer-reviewed spam information and analysis resource. 1377: – bulk unsolicited automatic phone calls using VoIP 34:
An email inbox containing a large amount of spam messages
3279:. Office of the Florida Attorney General. Archived from 3253:. Office of the Florida Attorney General. Archived from 3251:"Crist Announces First Case Under Florida Anti-Spam Law" 2450:
Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida,
334:
deleted all of the bulk posts from Usenet, only missing
61:, the term is applied to similar abuses in other media: 3176:
Braver v. Newport Internet Marketing Corporation et al.
2713:"Spam Cost Calculator: Calculate enterprise spam cost?" 2585:
International Review of Law, Computers & Technology
1388:
Pages displaying short descriptions of redirect targets
1386: – Poetic verse composed from spam e-mail contents 1309:
Pages displaying short descriptions of redirect targets
1283: – Type of confidence trick fraud (Nigerian spam) 3639:, Elsevier/Syngress; 1st edition, November 27, 2004. 2305:"On the Precision of Social and Information Networks" 1058:
employee, pleaded guilty to charges of violating the
627:
and are used to obtain citation data for calculating
430:
as an objective measure of a message's "spamminess".
385:
such as that generated by the social networking site
306:
How to Make a Fortune on the Information Superhighway
1436:
Pages displaying wikidata descriptions as a fallback
1421:
Pages displaying wikidata descriptions as a fallback
1379:
Pages displaying wikidata descriptions as a fallback
1135:
to cover the costs of investigation by the state of
979:
An ongoing concern expressed by parties such as the
862:
result; if the cost to recipients is excluded as an
296:
law services. The incident was commonly termed the "
4652: 4574: 4501: 4431: 4368: 4359: 4169: 3869: 3769: 1120:In 2005, Scott J. Filary and Donald E. Townsend of 373:, spam volume dropped to 66% of all email traffic. 269:computers sent by Gary Thuerk to 393 recipients on 3671:"Spam Archive list of spam from traceable sources" 2640:. Harvard University. 73 F.3d 497 (2d Cir. 1996). 2275:, Grace Bello, Direct Marketing News, June 1, 2012 1439:Pages displaying short descriptions with no spaces 940:or other malicious software. The objective may be 2886: 2884: 2185:"Social network launches worldwide spam campaign" 2127:"2014 Internet Security Threat Report, Volume 19" 2057:"A methodology for sender-oriented anti-spamming" 1295: – Deliberate use of someone else's identity 1730: 1728: 322:also occurred in 1994 on behalf of CitiHope, an 2915:"'Spam King' Robert Alan Soloway Pleads Guilty" 549:Big Buck Bunny Full Movie Online - Part 1/10 HD 2045:. July 28, 2009. Retrieved on August 31, 2009. 1366: – Organization targetting email spammers 4337: 3747: 3405:"Gordon Dick v Transcom Internet Service Ltd" 1736:"Origin of the term "spam" to mean net abuse" 1451: – Policy of blocking and deleting posts 886:as a method of increasing transaction costs). 692:In 2011 the origins of spam were analyzed by 8: 3689:Anti-Spam Consumer Resources and Information 3151:"Ex-AOL employee pleads guilty in spam case" 2473:: CS1 maint: multiple names: authors list ( 1307: – Attempt to defraud a person or group 460:malicious ads to send a user notifications. 2974:2011 IEEE Symposium on Security and Privacy 2893:"Alleged 'Seattle Spammer' arrested - CNET" 955:One of the world's most prolific spammers, 660:Bluespam, or the action of sending spam to 567:. Others may upload videos presented in an 4365: 4344: 4330: 4322: 3754: 3740: 3732: 3694:Cybertelecom:: Federal spam law and policy 3684:1 December 2009: arrest of a major spammer 2688:"California business and professions code" 2061:Journal of Intelligent & Fuzzy Systems 1344: – Spam on social networking services 1179:In the first successful case of its kind, 426:Usenet spam led to the development of the 4298:Security information and event management 3455:"Kiwi spam network was 'World's biggest'" 3230:Two Men Convicted Of Spamming Pornography 2981: 2800: 2516: 2514: 2398:"Social spam is taking over the Internet" 1969:"A very unhappy birthday to spam, age 30" 1583: 1581: 105:and file sharing spam. It is named after 2638:"Hormel Foods Corp. v. Jim Henson Prods" 2294:, Max Planck Centre for Computer Science 1146:, on June 25, 2008, pleaded guilty in a 698: 53:, or any prohibited purpose (especially 3430:"Article 13-Unsolicited communications" 3303:"Woman gets prison for 'Nigerian' scam" 2965:Levchenko, Kirill; et al. (2011). 1645:Spam - Monty Python's The Flying Circus 1490: 1467: 747: 3630:Spam: A Shadow History of the Internet 2940:"Spam Kingpin Robert Soloway Arrested" 2466: 2378: 2368: 2132:. Symantec Corporation. Archived from 1962: 1960: 1958: 1784: 1782: 140:Menu from a 2014 stage performance of 124:A person who creates spam is called a 117:fraud, are borne by the public and by 4275:Host-based intrusion detection system 2946:from the original on 17 December 2018 2427:The (Evil) Genius of Comment Spammers 2222:from the original on 17 December 2018 2195:from the original on October 23, 2011 1534:(definition & more). 2012-08-31. 1289: – Methods to prevent email spam 448:Mobile phone spam is directed at the 7: 3385:from the original on 29 October 2011 3075:from the original on August 15, 2002 3071:. BizJournals.com. BizJournals.com. 2938:SPAMfighter News (6 November 2007). 2752:from the original on 28 January 2011 2183:Hansell, Saul (September 13, 2007), 1827:from the original on 31 January 2009 1360: – Email spam reporting service 403:Instant messaging spam makes use of 4306:Runtime application self-protection 3727:Why am I getting all this spam? CDT 3635:Sjouwerman, Stu; Posluns, Jeffrey, 3373:"Businessman wins e-mail spam case" 3204:United States Department of Justice 3157:from the original on 28 August 2010 2010:from the original on April 17, 2014 1918:from the original on 11 August 2016 1348:Spam and Open Relay Blocking System 606:VoIP (Voice over Internet Protocol) 4531:Distributed Checksum Clearinghouse 3716:Slamming Spamming Resource on Spam 3467:from the original on 10 March 2014 2742:"Using data to help prevent fraud" 2618:Cisco 2011 Annual Security Report 1938:"Reaction to the DEC Spam of 1978" 1338: – Form of social engineering 1113:, according to a release from the 1022:E-mail spam legislation by country 633:University of California, Berkeley 525:Spam targeting video sharing sites 239:), but this term did not persist. 14: 4516:Challenge–response spam filtering 4353:Unsolicited digital communication 4238:Security-focused operating system 3127:. thesmokinggun.com. 2010-07-14. 3048:from the original on 22 June 2020 2540:Seneviratne, Suranga (Apr 2017). 2408:from the original on 1 March 2013 2216:"Spim, Like Spam, Is On The Rise" 1979:from the original on May 19, 2023 1821:"Spam blights e-mail 15 years on" 1669:Hambridge, S.; Lunde, A. (1999). 610:SIP (Session Initiation Protocol) 286:Laurence Canter and Martha Siegel 4034:Insecure direct object reference 3710:Reaction to the DEC Spam of 1978 3704:Malware City - The Spam Omelette 3541:"Закон За Електронната Търговия" 3125:"Pair Nabbed In AOL Spam Scheme" 2789:Journal of Economic Perspectives 2489:"Toy Story 3 movie scam warning" 2214:Thomas Claburn (30 March 2004). 1791:"At 30, Spam Going Nowhere Soon" 1258: 533:Screenshot from a spam video on 226:New Oxford Dictionary of English 167:sketch comedy television series 4288:Information security management 3609:from the original on 2007-09-05 3595:Specter, Michael (2007-08-06). 3547:from the original on 2013-07-24 3522:from the original on 2021-06-18 3493:from the original on 2013-06-26 3436:from the original on 2008-06-06 3411:from the original on 2014-06-05 3309:from the original on 2017-12-26 3210:from the original on 2007-10-15 3131:from the original on 2009-12-01 3105:from the original on 2018-04-13 3019:from the original on 2016-01-20 2841:from the original on 2012-01-12 2719:from the original on 2013-07-24 2694:from the original on 2013-08-28 2669:from the original on 2009-01-15 2644:from the original on 2014-10-28 2317:from the original on 2021-03-08 2248:from the original on 2019-03-23 2165:from the original on 2013-09-27 1944:from the original on 2013-07-30 1908:"Ideas & Trends; Spamology" 1888:from the original on 2011-06-05 1859:from the original on 2014-10-17 1819:Darren Waters (31 March 2008). 1801:from the original on 2019-04-21 1768:from the original on 2014-07-19 1742:from the original on 2012-07-16 1714:from the original on 2019-12-16 1708:"The Origin of the word 'Spam'" 1689:from the original on 2010-08-01 1624:from the original on 2020-02-15 1567:from the original on 2012-02-24 1538:from the original on 2019-03-23 1509:from the original on 2016-05-14 1428: – Electronic chain letter 109:, a luncheon meat, by way of a 101:, spam mobile apps, television 3240:InformationWeek, June 26, 2007 2923:. Mar 17, 2008. Archived from 1878:"Getting the message, at last" 1419: – American email spammer 985:American Civil Liberties Union 981:Electronic Frontier Foundation 866:the spammer can avoid paying. 1: 3153:. CNN.com. February 5, 2005. 2835:"The 10 Worst ROKSO Spammers" 2244:. lotsofways.de. 2018-10-18. 267:Digital Equipment Corporation 513:are often performed against 211:It later came to be used on 170:Monty Python's Flying Circus 4293:Information risk management 4214:Multi-factor authentication 3770:Related security categories 3669:The Spam Archive | Spamdex 2546:ACM Transactions on the Web 1906:Zeller, Tom (1 June 2003). 1642:Monty Python (2009-01-13), 1607:. New York, NY: ACM Press. 1331:Network Abuse Clearinghouse 932:Spam can be used to spread 796: 790: 785: 779: 774: 768: 763: 755: 742: 736: 731: 725: 720: 714: 623:enable researchers to find 87:mobile phone messaging spam 4758: 4742:Online advertising methods 4551:Naive Bayes spam filtering 4270:Intrusion detection system 4228:Computer security software 3884:Advanced persistent threat 3354:Gordon v. Virtumundo, Inc. 2816:"TOP 10 spam service ISPs" 2396:Dan Tynan (3 April 2012). 1967:Abate, Tom (May 3, 2008). 1789:Thuerk, Gary; Furr, Joel, 1532:Merriam-Webster Dictionary 1327: – Malicious software 1301: – Type of email spam 1245:news.admin.net-abuse.email 1168:Gordon v. Virtumundo, Inc. 1019: 916:. The conversion rate for 594: 555:, trainer, ISO file for a 491: 467: 441: 414: 396: 361: 252:In the late 19th century, 119:Internet service providers 18: 3855: 3849:Digital rights management 3362: (9th Cir. 2009). 2597:10.1080/13600860902742513 2345:10.1109/CCIP.2015.7100738 1232:e-mail address harvesting 838:Email spam exemplifies a 830:The cost to providers of 488:Blog, wiki, and guestbook 156:is derived from the 1970 4526:Disposable email address 4388:Directory harvest attack 3994:Denial-of-service attack 3889:Arbitrary code execution 3568:. Kzp.bg. Archived from 1855:(4.4.7 ed.), CatB, 1557:"The Definition of Spam" 1126:Florida Attorney General 1105:, and transportation of 1087:Paradise Valley, Arizona 835:threatened by spamming. 809:Hormel Foods Corporation 378:email address harvesting 4204:Computer access control 4156:Rogue security software 3819:Electromagnetic warfare 3489:. Ftc.gov. 2011-06-24. 3099:www.brechtweigelhaus.de 2108:. MAAWG. Archived from 1973:San Francisco Chronicle 1044:Tennessee Supreme Court 872:is the combination of: 631:. Researchers from the 621:Academic search engines 577:standards and practices 551:, a link to a supposed 173:. The sketch, set in a 4250:Obfuscation (software) 3979:Browser Helper Objects 3863: 3543:. Lex.bg. 2011-08-14. 2339:. IEEE. pp. 1–6. 2103:"Email Metrics Report" 2000:"Twenty Years of Spam" 840:tragedy of the commons 539: 464:Social networking spam 383:social networking spam 149: 95:junk fax transmissions 71:Web search engine spam 63:instant messaging spam 35: 23:. For other uses, see 4245:Data-centric security 4126:Remote access trojans 3861: 3721:Spamtrackers SpamWiki 3432:. Eur-lex.europa.eu. 3360:575 F.3d 1040 2870:. Alexandria, VA, USA 2738:Ghosemajumder, Shuman 2579:Kosta, Eleni (2009). 1762:"The Origins of Spam" 1593:Garcia-Molina, Hector 1115:Department of Justice 1042:was disbarred by the 860:cost–benefit analysis 819:Cost–benefit analyses 532: 292:posting to advertise 139: 83:online classified ads 67:Usenet newsgroup spam 33: 25:Spam (disambiguation) 4732:Internet terminology 4722:History of computing 4536:Email authentication 4177:Application security 4071:Privilege escalation 3939:Cross-site scripting 3792:Cybersex trafficking 3763:Information security 3407:. Scotchspam.co.uk. 3381:. 27 December 2005. 3206:. October 12, 2007. 3044:. 11 February 2008. 2976:. pp. 431–446. 2457:ACM SIGIR Conference 1561:The Spamhaus Project 1449:Usenet Death Penalty 1364:The Spamhaus Project 1287:Anti-spam techniques 1111:CAN-SPAM Act of 2003 1005:CAN-SPAM Act of 2003 688:Geographical origins 629:author-level metrics 608:spam, usually using 371:Symantec Corporation 311:An early example of 4383:Bulk email software 3824:Information warfare 3782:Automotive security 3463:. 16 October 2008. 2891:Lombardi, Candace. 2802:10.1257/jep.26.3.87 2073:10.3233/JIFS-179562 1797:(interviews), NPR, 1760:Goldberg, Myshele. 1597:"Web spam taxonomy" 1165:In a 2009 opinion, 1144:Olympia, Washington 1050:practice. In 2005, 957:Robert Alan Soloway 668:Noncommercial forms 625:academic literature 411:Newsgroup and forum 288:, began using bulk 198:fans often invaded 111:Monty Python sketch 91:Internet forum spam 4233:Antivirus software 4101:Social engineering 4066:Polymorphic engine 4019:Fraudulent dialers 3924:Hardware backdoors 3864: 3283:on 15 January 2009 3257:on 15 January 2009 3181:2007-01-23 at the 3042:www.anti-abuse.org 2992:10.1109/SP.2011.24 2821:2005-12-04 at the 2771:Thank the Spammers 2623:2012-02-03 at the 2527:2011-07-28 at the 2432:2012-10-21 at the 2290:2012-09-20 at the 2271:2012-07-05 at the 2189:The New York Times 2028:Danchev, Dancho. " 1912:The New York Times 1823:. news.bbc.co.uk. 1738:. Templetons.com. 1083:Venice, California 965:"zombie" computers 944:, or worse (e.g., 581:television station 540: 353:In different media 279:multi-user dungeon 150: 36: 4694: 4693: 4521:Context filtering 4497: 4496: 4319: 4318: 4281:Anomaly detection 4186:Secure by default 4039:Keystroke loggers 3974:Drive-by download 3862:vectorial version 3829:Internet security 3777:Computer security 3665:978-0-521886-50-5 3655:978-1-601383-03-7 3645:978-1-932266-86-3 3001:978-0-7695-4402-1 2740:(18 March 2008). 2493:Web User magazine 2354:978-1-4799-7171-8 1614:978-1-59593-046-0 1476:Advance fee fraud 946:advance fee fraud 801: 800: 444:Mobile phone spam 405:instant messaging 393:Instant messaging 318:bulk posting via 49:, non-commercial 4749: 4737:Internet culture 4662:Advance-fee scam 4609:Keyword stuffing 4366: 4346: 4339: 4332: 4323: 4190:Secure by design 4121:Hardware Trojans 3954:History sniffing 3944:Cross-site leaks 3839:Network security 3756: 3749: 3742: 3733: 3617: 3615: 3614: 3581: 3580: 3578: 3577: 3562: 3556: 3555: 3553: 3552: 3537: 3531: 3530: 3528: 3527: 3508: 3502: 3501: 3499: 3498: 3483: 3477: 3476: 3474: 3472: 3451: 3445: 3444: 3442: 3441: 3426: 3420: 3419: 3417: 3416: 3401: 3395: 3394: 3392: 3390: 3369: 3363: 3357: 3349: 3343: 3342: 3340: 3339: 3324: 3318: 3317: 3315: 3314: 3299: 3293: 3292: 3290: 3288: 3273: 3267: 3266: 3264: 3262: 3247: 3241: 3227:Gaudin, Sharon, 3225: 3219: 3218: 3216: 3215: 3196: 3190: 3173: 3167: 3166: 3164: 3162: 3146: 3140: 3139: 3137: 3136: 3120: 3114: 3113: 3111: 3110: 3091: 3085: 3084: 3082: 3080: 3064: 3058: 3057: 3055: 3053: 3034: 3028: 3027: 3025: 3024: 3018: 2985: 2971: 2962: 2956: 2955: 2953: 2951: 2935: 2929: 2928: 2910: 2904: 2903: 2901: 2900: 2888: 2879: 2878: 2876: 2875: 2865: 2856: 2850: 2849: 2847: 2846: 2831: 2825: 2812: 2806: 2805: 2804: 2784: 2778: 2775:William R. James 2768: 2762: 2761: 2759: 2757: 2734: 2728: 2727: 2725: 2724: 2709: 2703: 2702: 2700: 2699: 2684: 2678: 2677: 2675: 2674: 2659: 2653: 2652: 2650: 2649: 2634: 2628: 2615: 2609: 2608: 2576: 2570: 2569: 2537: 2531: 2518: 2509: 2508: 2506: 2504: 2495:. Archived from 2485: 2479: 2478: 2472: 2464: 2462: 2447: 2441: 2424: 2418: 2417: 2415: 2413: 2393: 2387: 2386: 2380: 2376: 2374: 2366: 2332: 2326: 2325: 2323: 2322: 2316: 2309: 2301: 2295: 2282: 2276: 2263: 2257: 2256: 2254: 2253: 2238: 2232: 2231: 2229: 2227: 2211: 2205: 2203: 2202: 2200: 2180: 2174: 2173: 2171: 2170: 2155: 2149: 2148: 2146: 2144: 2138: 2131: 2123: 2117: 2116: 2114: 2107: 2099: 2093: 2092: 2067:(3): 2765–2776. 2052: 2046: 2026: 2020: 2019: 2017: 2015: 1998:Conway, Andrew. 1995: 1989: 1988: 1986: 1984: 1964: 1953: 1952: 1950: 1949: 1934: 1928: 1927: 1925: 1923: 1903: 1897: 1896: 1894: 1893: 1874: 1868: 1866: 1865: 1864: 1843: 1837: 1836: 1834: 1832: 1816: 1810: 1808: 1807: 1806: 1786: 1777: 1776: 1774: 1773: 1757: 1751: 1750: 1748: 1747: 1732: 1723: 1722: 1720: 1719: 1704: 1698: 1697: 1695: 1694: 1683:10.17487/RFC2635 1675:Ietf Datatracker 1666: 1660: 1659: 1658: 1657: 1648:, archived from 1639: 1633: 1632: 1630: 1629: 1623: 1601: 1585: 1576: 1575: 1573: 1572: 1553: 1547: 1546: 1544: 1543: 1524: 1518: 1517: 1515: 1514: 1495: 1478: 1472: 1440: 1437: 1422: 1399:Suppression list 1389: 1380: 1353: 1320:List of spammers 1310: 1305:Confidence trick 1281:Advance-fee scam 1268: 1263: 1262: 1142:Edna Fiedler of 1103:money laundering 1072:default judgment 975:Political issues 934:computer viruses 895:punitive damages 880:Transaction cost 804:Trademark issues 699: 579:department at a 347:English language 237:a cheese product 4757: 4756: 4752: 4751: 4750: 4748: 4747: 4746: 4727:Internet ethics 4697: 4696: 4695: 4690: 4674:Make Money Fast 4648: 4644:URL redirection 4570: 4493: 4427: 4378:Address munging 4355: 4350: 4320: 4315: 4165: 3865: 3853: 3844:Copy protection 3834:Mobile security 3765: 3760: 3680: 3628:Brunton, Finn. 3625: 3623:Further reading 3620: 3612: 3610: 3594: 3590: 3585: 3584: 3575: 3573: 3564: 3563: 3559: 3550: 3548: 3539: 3538: 3534: 3525: 3523: 3510: 3509: 3505: 3496: 3494: 3485: 3484: 3480: 3470: 3468: 3453: 3452: 3448: 3439: 3437: 3428: 3427: 3423: 3414: 3412: 3403: 3402: 3398: 3388: 3386: 3371: 3370: 3366: 3351: 3350: 3346: 3337: 3335: 3326: 3325: 3321: 3312: 3310: 3301: 3300: 3296: 3286: 3284: 3275: 3274: 3270: 3260: 3258: 3249: 3248: 3244: 3226: 3222: 3213: 3211: 3198: 3197: 3193: 3183:Wayback Machine 3174: 3170: 3160: 3158: 3149: 3147: 3143: 3134: 3132: 3123: 3121: 3117: 3108: 3106: 3093: 3092: 3088: 3078: 3076: 3067:Credeur, Mary. 3066: 3065: 3061: 3051: 3049: 3038:"RBL criticism" 3036: 3035: 3031: 3022: 3020: 3016: 3002: 2983:10.1.1.706.1497 2969: 2964: 2963: 2959: 2949: 2947: 2937: 2936: 2932: 2920:InformationWeek 2913: 2912:Thomas Claburn. 2911: 2907: 2898: 2896: 2890: 2889: 2882: 2873: 2871: 2863: 2858: 2857: 2853: 2844: 2842: 2833: 2832: 2828: 2823:Wayback Machine 2813: 2809: 2786: 2785: 2781: 2769: 2765: 2755: 2753: 2736: 2735: 2731: 2722: 2720: 2711: 2710: 2706: 2697: 2695: 2686: 2685: 2681: 2672: 2670: 2661: 2660: 2656: 2647: 2645: 2636: 2635: 2631: 2625:Wayback Machine 2616: 2612: 2578: 2577: 2573: 2558:10.1145/3007901 2539: 2538: 2534: 2529:Wayback Machine 2519: 2512: 2502: 2500: 2487: 2486: 2482: 2469:cite conference 2465: 2460: 2452:Jussara Almeida 2449: 2448: 2444: 2434:Wayback Machine 2425: 2421: 2411: 2409: 2395: 2394: 2390: 2377: 2367: 2355: 2334: 2333: 2329: 2320: 2318: 2314: 2307: 2303: 2302: 2298: 2292:Wayback Machine 2283: 2279: 2273:Wayback Machine 2264: 2260: 2251: 2249: 2240: 2239: 2235: 2225: 2223: 2213: 2212: 2208: 2198: 2196: 2182: 2181: 2177: 2168: 2166: 2157: 2156: 2152: 2142: 2140: 2136: 2129: 2125: 2124: 2120: 2112: 2105: 2101: 2100: 2096: 2054: 2053: 2049: 2027: 2023: 2013: 2011: 1997: 1996: 1992: 1982: 1980: 1966: 1965: 1956: 1947: 1945: 1936: 1935: 1931: 1921: 1919: 1905: 1904: 1900: 1891: 1889: 1876: 1875: 1871: 1862: 1860: 1852:The Jargon File 1845: 1844: 1840: 1830: 1828: 1818: 1817: 1813: 1804: 1802: 1788: 1787: 1780: 1771: 1769: 1759: 1758: 1754: 1745: 1743: 1734: 1733: 1726: 1717: 1715: 1706: 1705: 1701: 1692: 1690: 1668: 1667: 1663: 1655: 1653: 1641: 1640: 1636: 1627: 1625: 1621: 1615: 1599: 1589:Gyöngyi, Zoltan 1587: 1586: 1579: 1570: 1568: 1555: 1554: 1550: 1541: 1539: 1526: 1525: 1521: 1512: 1510: 1503:play.google.com 1497: 1496: 1492: 1487: 1482: 1481: 1473: 1469: 1464: 1459: 1454: 1438: 1435: 1434: – spammer 1432:Sanford Wallace 1426:Make Money Fast 1420: 1387: 1378: 1351: 1308: 1275:Address munging 1266:Internet portal 1264: 1257: 1254: 1240: 1215: 1201: 1185:Channel Islands 1177: 1048:immigration law 1040:Laurence Canter 1036:Sanford Wallace 1029: 1024: 1018: 977: 930: 914:conversion rate 856: 821: 811:, the maker of 806: 749: 709: 690: 670: 658: 649: 618: 616:Academic search 599: 593: 527: 501:is spamming on 496: 490: 481: 472: 466: 446: 440: 428:Breidbart Index 423: 415:Main articles: 413: 401: 395: 376:An industry of 366: 360: 355: 263: 250: 245: 222:Make Money Fast 134: 28: 17: 12: 11: 5: 4755: 4753: 4745: 4744: 4739: 4734: 4729: 4724: 4719: 4714: 4709: 4699: 4698: 4692: 4691: 4689: 4688: 4687: 4686: 4676: 4671: 4670: 4669: 4658: 4656: 4654:Internet fraud 4650: 4649: 4647: 4646: 4641: 4636: 4631: 4626: 4621: 4616: 4611: 4606: 4604:Google bombing 4601: 4596: 4591: 4586: 4580: 4578: 4572: 4571: 4569: 4568: 4563: 4558: 4553: 4548: 4546:List poisoning 4543: 4538: 4533: 4528: 4523: 4518: 4513: 4507: 4505: 4499: 4498: 4495: 4494: 4492: 4491: 4486: 4481: 4476: 4471: 4466: 4461: 4456: 4451: 4446: 4441: 4435: 4433: 4429: 4428: 4426: 4425: 4420: 4415: 4410: 4405: 4403:Email spoofing 4400: 4395: 4390: 4385: 4380: 4374: 4372: 4363: 4357: 4356: 4351: 4349: 4348: 4341: 4334: 4326: 4317: 4316: 4314: 4313: 4311:Site isolation 4308: 4303: 4302: 4301: 4295: 4285: 4284: 4283: 4278: 4267: 4262: 4257: 4252: 4247: 4242: 4241: 4240: 4235: 4225: 4224: 4223: 4218: 4217: 4216: 4209:Authentication 4201: 4200: 4199: 4198: 4197: 4187: 4184: 4173: 4171: 4167: 4166: 4164: 4163: 4158: 4153: 4148: 4143: 4138: 4133: 4128: 4123: 4118: 4113: 4108: 4103: 4098: 4093: 4088: 4083: 4078: 4073: 4068: 4063: 4062: 4061: 4051: 4046: 4041: 4036: 4031: 4026: 4021: 4016: 4011: 4009:Email spoofing 4006: 4001: 3996: 3991: 3986: 3981: 3976: 3971: 3966: 3961: 3956: 3951: 3949:DOM clobbering 3946: 3941: 3936: 3931: 3929:Code injection 3926: 3921: 3920: 3919: 3914: 3909: 3904: 3896: 3891: 3886: 3881: 3875: 3873: 3867: 3866: 3856: 3854: 3852: 3851: 3846: 3841: 3836: 3831: 3826: 3821: 3816: 3811: 3809:Cyberterrorism 3806: 3801: 3800: 3799: 3797:Computer fraud 3794: 3784: 3779: 3773: 3771: 3767: 3766: 3761: 3759: 3758: 3751: 3744: 3736: 3730: 3729: 3724: 3718: 3713: 3707: 3701: 3696: 3691: 3686: 3679: 3678:External links 3676: 3675: 3674: 3667: 3657: 3647: 3633: 3624: 3621: 3619: 3618: 3602:The New Yorker 3591: 3589: 3586: 3583: 3582: 3557: 3532: 3503: 3478: 3446: 3421: 3396: 3364: 3344: 3319: 3294: 3268: 3242: 3236:2013-01-03 at 3220: 3191: 3168: 3141: 3115: 3086: 3069:"Staff Writer" 3059: 3029: 3000: 2957: 2930: 2927:on 2015-02-09. 2905: 2880: 2851: 2826: 2807: 2779: 2763: 2729: 2704: 2679: 2654: 2629: 2610: 2591:(1–2): 89–97. 2571: 2532: 2510: 2499:on 11 May 2012 2480: 2442: 2438:Wired Magazine 2419: 2388: 2379:|website= 2353: 2327: 2296: 2277: 2258: 2233: 2206: 2175: 2150: 2139:on 13 May 2014 2118: 2115:on 2007-12-03. 2094: 2047: 2035:2012-07-08 at 2021: 1990: 1954: 1940:. Templetons. 1929: 1898: 1884:. 2007-12-14. 1869: 1838: 1811: 1778: 1752: 1724: 1699: 1661: 1634: 1613: 1577: 1548: 1519: 1489: 1488: 1486: 1483: 1480: 1479: 1466: 1465: 1463: 1460: 1458: 1455: 1453: 1452: 1446: 1441: 1429: 1423: 1417:Howard Carmack 1413: 1412: 1408: 1407: 1404:Voice phishing 1401: 1396: 1390: 1381: 1372: 1367: 1361: 1355: 1345: 1339: 1333: 1328: 1322: 1317: 1311: 1302: 1296: 1293:Identity theft 1290: 1284: 1278: 1271: 1270: 1269: 1253: 1250: 1249: 1248: 1239: 1236: 1214: 1211: 1206:Shane Atkinson 1200: 1197: 1176: 1175:United Kingdom 1173: 1122:Tampa, Florida 1074:and permanent 1067:Robert Soloway 1056:America Online 1052:Jason Smathers 1028: 1025: 1017: 1014: 976: 973: 942:identity theft 929: 926: 906: 905: 902:Newsgroup spam 898: 887: 877: 855: 852: 832:search engines 825:European Union 820: 817: 805: 802: 799: 798: 795: 794:United States 792: 788: 787: 784: 781: 777: 776: 773: 770: 766: 765: 762: 758: 757: 754: 751: 745: 744: 741: 738: 734: 733: 730: 727: 723: 722: 719: 716: 712: 711: 706: 703: 689: 686: 669: 666: 657: 654: 648: 645: 641:Google Scholar 617: 614: 595:Main article: 592: 589: 526: 523: 492:Main article: 489: 486: 480: 477: 468:Main article: 465: 462: 450:text messaging 442:Main article: 439: 436: 417:Newsgroup spam 412: 409: 399:Messaging spam 397:Main article: 394: 391: 362:Main article: 359: 356: 354: 351: 262: 259: 249: 246: 244: 241: 133: 130: 15: 13: 10: 9: 6: 4: 3: 2: 4754: 4743: 4740: 4738: 4735: 4733: 4730: 4728: 4725: 4723: 4720: 4718: 4715: 4713: 4710: 4708: 4705: 4704: 4702: 4685: 4682: 4681: 4680: 4677: 4675: 4672: 4668: 4665: 4664: 4663: 4660: 4659: 4657: 4655: 4651: 4645: 4642: 4640: 4637: 4635: 4632: 4630: 4627: 4625: 4622: 4620: 4619:Referrer spam 4617: 4615: 4612: 4610: 4607: 4605: 4602: 4600: 4597: 4595: 4592: 4590: 4587: 4585: 4582: 4581: 4579: 4577: 4573: 4567: 4564: 4562: 4559: 4557: 4554: 4552: 4549: 4547: 4544: 4542: 4539: 4537: 4534: 4532: 4529: 4527: 4524: 4522: 4519: 4517: 4514: 4512: 4509: 4508: 4506: 4504: 4500: 4490: 4487: 4485: 4484:Telemarketing 4482: 4480: 4477: 4475: 4472: 4470: 4467: 4465: 4462: 4460: 4457: 4455: 4452: 4450: 4447: 4445: 4442: 4440: 4437: 4436: 4434: 4430: 4424: 4421: 4419: 4418:Pink contract 4416: 4414: 4411: 4409: 4406: 4404: 4401: 4399: 4396: 4394: 4391: 4389: 4386: 4384: 4381: 4379: 4376: 4375: 4373: 4371: 4367: 4364: 4362: 4358: 4354: 4347: 4342: 4340: 4335: 4333: 4328: 4327: 4324: 4312: 4309: 4307: 4304: 4299: 4296: 4294: 4291: 4290: 4289: 4286: 4282: 4279: 4276: 4273: 4272: 4271: 4268: 4266: 4263: 4261: 4258: 4256: 4253: 4251: 4248: 4246: 4243: 4239: 4236: 4234: 4231: 4230: 4229: 4226: 4222: 4221:Authorization 4219: 4215: 4212: 4211: 4210: 4207: 4206: 4205: 4202: 4196: 4193: 4192: 4191: 4188: 4185: 4183: 4182:Secure coding 4180: 4179: 4178: 4175: 4174: 4172: 4168: 4162: 4159: 4157: 4154: 4152: 4151:SQL injection 4149: 4147: 4144: 4142: 4139: 4137: 4134: 4132: 4131:Vulnerability 4129: 4127: 4124: 4122: 4119: 4117: 4116:Trojan horses 4114: 4112: 4111:Software bugs 4109: 4107: 4104: 4102: 4099: 4097: 4094: 4092: 4089: 4087: 4084: 4082: 4079: 4077: 4074: 4072: 4069: 4067: 4064: 4060: 4057: 4056: 4055: 4052: 4050: 4047: 4045: 4042: 4040: 4037: 4035: 4032: 4030: 4027: 4025: 4022: 4020: 4017: 4015: 4012: 4010: 4007: 4005: 4002: 4000: 3999:Eavesdropping 3997: 3995: 3992: 3990: 3989:Data scraping 3987: 3985: 3982: 3980: 3977: 3975: 3972: 3970: 3967: 3965: 3962: 3960: 3959:Cryptojacking 3957: 3955: 3952: 3950: 3947: 3945: 3942: 3940: 3937: 3935: 3932: 3930: 3927: 3925: 3922: 3918: 3915: 3913: 3910: 3908: 3905: 3903: 3900: 3899: 3897: 3895: 3892: 3890: 3887: 3885: 3882: 3880: 3877: 3876: 3874: 3872: 3868: 3860: 3850: 3847: 3845: 3842: 3840: 3837: 3835: 3832: 3830: 3827: 3825: 3822: 3820: 3817: 3815: 3812: 3810: 3807: 3805: 3802: 3798: 3795: 3793: 3790: 3789: 3788: 3785: 3783: 3780: 3778: 3775: 3774: 3772: 3768: 3764: 3757: 3752: 3750: 3745: 3743: 3738: 3737: 3734: 3728: 3725: 3722: 3719: 3717: 3714: 3711: 3708: 3705: 3702: 3700: 3697: 3695: 3692: 3690: 3687: 3685: 3682: 3681: 3677: 3672: 3668: 3666: 3662: 3658: 3656: 3652: 3648: 3646: 3642: 3638: 3634: 3631: 3627: 3626: 3622: 3608: 3604: 3603: 3598: 3593: 3592: 3587: 3572:on 2010-09-27 3571: 3567: 3561: 3558: 3546: 3542: 3536: 3533: 3521: 3517: 3513: 3507: 3504: 3492: 3488: 3482: 3479: 3466: 3462: 3461: 3456: 3450: 3447: 3435: 3431: 3425: 3422: 3410: 3406: 3400: 3397: 3384: 3380: 3379: 3374: 3368: 3365: 3361: 3356: 3355: 3348: 3345: 3333: 3329: 3323: 3320: 3308: 3304: 3298: 3295: 3282: 3278: 3272: 3269: 3256: 3252: 3246: 3243: 3239: 3238:archive.today 3235: 3232: 3231: 3224: 3221: 3209: 3205: 3201: 3195: 3192: 3188: 3184: 3180: 3177: 3172: 3169: 3156: 3152: 3145: 3142: 3130: 3126: 3119: 3116: 3104: 3100: 3096: 3090: 3087: 3074: 3070: 3063: 3060: 3047: 3043: 3039: 3033: 3030: 3015: 3011: 3007: 3003: 2997: 2993: 2989: 2984: 2979: 2975: 2968: 2961: 2958: 2945: 2941: 2934: 2931: 2926: 2922: 2921: 2916: 2909: 2906: 2894: 2887: 2885: 2881: 2869: 2862: 2855: 2852: 2840: 2836: 2830: 2827: 2824: 2820: 2817: 2811: 2808: 2803: 2798: 2795:(3): 87–110, 2794: 2790: 2783: 2780: 2776: 2772: 2767: 2764: 2751: 2747: 2743: 2739: 2733: 2730: 2718: 2715:. Commtouch. 2714: 2708: 2705: 2693: 2689: 2683: 2680: 2668: 2664: 2658: 2655: 2643: 2639: 2633: 2630: 2626: 2622: 2619: 2614: 2611: 2606: 2602: 2598: 2594: 2590: 2586: 2582: 2575: 2572: 2567: 2563: 2559: 2555: 2551: 2547: 2543: 2536: 2533: 2530: 2526: 2523: 2517: 2515: 2511: 2498: 2494: 2490: 2484: 2481: 2476: 2470: 2459: 2458: 2453: 2446: 2443: 2439: 2435: 2431: 2428: 2423: 2420: 2407: 2403: 2399: 2392: 2389: 2384: 2372: 2364: 2360: 2356: 2350: 2346: 2342: 2338: 2331: 2328: 2313: 2306: 2300: 2297: 2293: 2289: 2286: 2281: 2278: 2274: 2270: 2267: 2262: 2259: 2247: 2243: 2237: 2234: 2221: 2217: 2210: 2207: 2194: 2190: 2186: 2179: 2176: 2164: 2160: 2154: 2151: 2135: 2128: 2122: 2119: 2111: 2104: 2098: 2095: 2090: 2086: 2082: 2078: 2074: 2070: 2066: 2062: 2058: 2051: 2048: 2044: 2043: 2038: 2037:archive.today 2034: 2031: 2025: 2022: 2009: 2005: 2001: 1994: 1991: 1978: 1974: 1970: 1963: 1961: 1959: 1955: 1943: 1939: 1933: 1930: 1917: 1913: 1909: 1902: 1899: 1887: 1883: 1882:The Economist 1879: 1873: 1870: 1858: 1854: 1853: 1848: 1842: 1839: 1826: 1822: 1815: 1812: 1800: 1796: 1792: 1785: 1783: 1779: 1767: 1763: 1756: 1753: 1741: 1737: 1731: 1729: 1725: 1713: 1709: 1703: 1700: 1688: 1684: 1680: 1676: 1672: 1665: 1662: 1652:on 2010-05-22 1651: 1647: 1646: 1638: 1635: 1620: 1616: 1610: 1606: 1598: 1594: 1590: 1584: 1582: 1578: 1566: 1562: 1558: 1552: 1549: 1537: 1533: 1529: 1523: 1520: 1508: 1504: 1500: 1494: 1491: 1484: 1477: 1471: 1468: 1461: 1456: 1450: 1447: 1445: 1442: 1433: 1430: 1427: 1424: 1418: 1415: 1414: 1410: 1409: 1405: 1402: 1400: 1397: 1394: 1391: 1385: 1382: 1376: 1373: 1371: 1368: 1365: 1362: 1359: 1356: 1349: 1346: 1343: 1340: 1337: 1334: 1332: 1329: 1326: 1323: 1321: 1318: 1315: 1312: 1306: 1303: 1300: 1297: 1294: 1291: 1288: 1285: 1282: 1279: 1276: 1273: 1272: 1267: 1261: 1256: 1251: 1247: 1246: 1242: 1241: 1237: 1235: 1233: 1227: 1223: 1220: 1212: 1210: 1207: 1198: 1196: 1192: 1188: 1186: 1182: 1181:Nigel Roberts 1174: 1172: 1170: 1169: 1163: 1161: 1157: 1153: 1149: 1145: 1140: 1138: 1134: 1130: 1129:Charlie Crist 1127: 1124:were sued by 1123: 1118: 1116: 1112: 1108: 1104: 1100: 1096: 1092: 1088: 1084: 1079: 1077: 1073: 1068: 1063: 1061: 1057: 1053: 1049: 1045: 1041: 1037: 1033: 1027:United States 1026: 1023: 1015: 1013: 1010: 1006: 1002: 998: 993: 991: 986: 982: 974: 972: 968: 966: 962: 958: 953: 951: 947: 943: 939: 938:trojan horses 935: 927: 925: 923: 919: 915: 910: 903: 899: 896: 892: 888: 885: 881: 878: 875: 874: 873: 871: 867: 865: 861: 854:General costs 853: 851: 848: 845: 841: 836: 833: 828: 826: 818: 816: 814: 810: 803: 793: 789: 782: 778: 771: 767: 760: 759: 752: 746: 739: 735: 728: 724: 717: 713: 707: 704: 701: 700: 697: 695: 694:Cisco Systems 687: 685: 683: 680:have spammed 679: 675: 667: 665: 663: 655: 653: 646: 644: 642: 638: 634: 630: 626: 622: 615: 613: 611: 607: 603: 598: 590: 588: 586: 585:cable network 582: 578: 574: 570: 566: 562: 558: 554: 550: 546: 536: 531: 524: 522: 520: 516: 512: 508: 504: 500: 495: 494:Spam in blogs 487: 485: 478: 476: 471: 463: 461: 457: 455: 452:service of a 451: 445: 437: 435: 431: 429: 422: 418: 410: 408: 406: 400: 392: 390: 388: 384: 379: 374: 372: 365: 357: 352: 350: 348: 343: 339: 337: 333: 329: 325: 321: 317: 314: 309: 307: 303: 299: 295: 291: 287: 282: 280: 275: 272: 268: 260: 258: 255: 254:Western Union 247: 242: 240: 238: 234: 229: 227: 223: 219: 214: 209: 207: 203: 202: 197: 196: 191: 187: 182: 180: 176: 172: 171: 166: 162: 159: 155: 147: 143: 138: 131: 129: 127: 122: 120: 114: 112: 108: 104: 100: 96: 92: 88: 84: 80: 76: 75:spam in blogs 72: 68: 64: 60: 56: 52: 51:proselytizing 48: 44: 40: 32: 26: 22: 4667:Lottery scam 4624:Scraper site 4594:Doorway page 4464:Mobile phone 4444:Cold calling 4352: 4255:Data masking 4095: 3814:Cyberwarfare 3629: 3611:. Retrieved 3600: 3574:. Retrieved 3570:the original 3560: 3549:. Retrieved 3535: 3524:. Retrieved 3515: 3506: 3495:. Retrieved 3481: 3469:. Retrieved 3458: 3449: 3438:. Retrieved 3424: 3413:. Retrieved 3399: 3387:. Retrieved 3376: 3367: 3352: 3347: 3336:. Retrieved 3334:. 2008-06-25 3331: 3322: 3311:. Retrieved 3297: 3285:. Retrieved 3281:the original 3271: 3259:. Retrieved 3255:the original 3245: 3229: 3223: 3212:. Retrieved 3194: 3189:, 2005-02-22 3186: 3171: 3159:. Retrieved 3144: 3133:. Retrieved 3118: 3107:. Retrieved 3098: 3089: 3077:. Retrieved 3062: 3050:. Retrieved 3041: 3032: 3021:. Retrieved 2973: 2960: 2948:. Retrieved 2933: 2925:the original 2918: 2908: 2897:. Retrieved 2872:. Retrieved 2867: 2854: 2843:. Retrieved 2837:. Spamhaus. 2829: 2810: 2792: 2788: 2782: 2774: 2766: 2754:. Retrieved 2732: 2721:. Retrieved 2707: 2696:. Retrieved 2690:. Spamlaws. 2682: 2671:. Retrieved 2657: 2646:. Retrieved 2632: 2613: 2588: 2584: 2574: 2549: 2545: 2535: 2501:. Retrieved 2497:the original 2492: 2483: 2456: 2445: 2440:, March 2004 2437: 2422: 2410:. Retrieved 2401: 2391: 2336: 2330: 2319:. Retrieved 2299: 2280: 2261: 2250:. Retrieved 2236: 2224:. Retrieved 2209: 2197:, retrieved 2188: 2178: 2167:. Retrieved 2161:. List DNA. 2153: 2141:. Retrieved 2134:the original 2121: 2110:the original 2097: 2064: 2060: 2050: 2040: 2024: 2012:. Retrieved 2003: 1993: 1981:. Retrieved 1972: 1946:. Retrieved 1932: 1920:. Retrieved 1911: 1901: 1890:. Retrieved 1881: 1872: 1861:, retrieved 1851: 1841: 1829:. Retrieved 1814: 1803:, retrieved 1794: 1770:. Retrieved 1755: 1744:. Retrieved 1716:. Retrieved 1702: 1691:. Retrieved 1674: 1664: 1654:, retrieved 1650:the original 1644: 1637: 1626:. Retrieved 1603: 1569:. Retrieved 1560: 1551: 1540:. Retrieved 1531: 1522: 1511:. Retrieved 1502: 1493: 1470: 1243: 1228: 1224: 1216: 1202: 1193: 1189: 1178: 1166: 1164: 1141: 1119: 1080: 1064: 1060:CAN-SPAM Act 1034: 1030: 994: 978: 969: 961:e-mail fraud 954: 931: 922:Storm botnet 908: 907: 869: 868: 857: 849: 837: 829: 822: 807: 753:South Korea 691: 674:Serdar Argic 671: 659: 650: 619: 600: 573:testimonials 548: 541: 507:Movable Type 497: 482: 473: 458: 454:mobile phone 447: 438:Mobile phone 432: 424: 402: 375: 367: 344: 340: 336:three copies 310: 305: 283: 276: 264: 251: 248:Pre-Internet 230: 210: 205: 199: 193: 183: 168: 153: 151: 142:Monty Python 125: 123: 115: 42: 38: 37: 4629:Social spam 4541:Greylisting 4511:Client-side 4439:Auto dialer 4195:Misuse case 4029:Infostealer 4004:Email fraud 3969:Data breach 3804:Cybergeddon 3597:"Damn Spam" 3471:13 November 3460:Stuff.co.nz 3389:13 November 3305:. upi.com. 3287:21 December 3261:21 December 2950:17 December 2746:Google Blog 2226:17 December 2199:December 9, 1922:20 February 1370:Spamigation 1342:Social spam 1199:New Zealand 1054:, a former 1016:Court cases 1012:community. 864:externality 678:evangelists 647:Mobile apps 569:infomercial 479:Social spam 470:Social spam 328:Bosnian War 316:fundraising 302:free speech 294:immigration 233:crossposted 208:fans left. 103:advertising 99:social spam 47:advertising 4717:E-commerce 4712:Cybercrime 4701:Categories 4634:Spam blogs 4599:Forum spam 4576:Spamdexing 4449:Flyposting 4408:Image spam 4370:Email spam 4260:Encryption 4136:Web shells 4076:Ransomware 4024:Hacktivism 3787:Cybercrime 3613:2007-08-02 3576:2013-09-03 3551:2013-09-03 3526:2021-02-18 3497:2013-09-03 3440:2013-09-03 3415:2013-09-03 3338:2014-01-30 3313:2008-06-27 3214:2007-10-25 3135:2007-03-07 3109:2018-04-12 3023:2015-10-29 2899:2013-09-03 2895:. News.com 2874:2008-11-05 2845:2013-09-03 2814:Spamhaus' 2777:2003-03-10 2723:2013-09-03 2698:2013-09-03 2673:2013-09-03 2665:. Europa. 2648:2015-02-12 2503:23 January 2321:2020-08-12 2252:2018-10-29 2169:2013-09-03 1948:2013-09-03 1892:2007-12-14 1863:2014-05-03 1847:"velveeta" 1805:2018-04-06 1772:2014-07-15 1746:2013-09-03 1718:2010-09-20 1693:2010-09-29 1656:2017-01-11 1628:2007-10-05 1571:2013-09-03 1542:2013-07-05 1513:2016-05-01 1457:References 1299:Image spam 1238:Newsgroups 1156:accomplice 1095:conspiracy 1076:injunction 1020:See also: 1001:conversion 761:Indonesia 710:volume(%) 557:video game 538:different. 519:guestbooks 421:Forum spam 364:Email spam 298:Green Card 59:email spam 21:Email spam 4614:Link farm 4584:Blog spam 4503:Anti-spam 4469:Newsgroup 4459:Messaging 4361:Protocols 4091:Shellcode 4086:Scareware 3934:Crimeware 3894:Backdoors 3516:prezi.com 3161:27 August 2978:CiteSeerX 2756:12 August 2381:ignored ( 2371:cite book 2089:213636917 2081:1064-1246 2014:April 11, 2004:Cloudmark 1831:26 August 1485:Citations 1444:Spam King 1375:VoIP spam 1314:Junk mail 1183:from the 1152:probation 1065:In 2007, 662:Bluetooth 656:Bluetooth 602:VoIP spam 597:VoIP spam 591:VoIP Spam 545:thumbnail 499:Blog spam 313:nonprofit 218:Joel Furr 206:Star Trek 201:Star Trek 195:Star Wars 152:The term 144:'s 1970 " 132:Etymology 79:wiki spam 4707:Spamming 4679:Phishing 4589:Cloaking 4566:Spamhaus 4474:Robocall 4454:Junk fax 4265:Firewall 4170:Defenses 4096:Spamming 4081:Rootkits 4054:Phishing 4014:Exploits 3607:Archived 3545:Archived 3520:Archived 3491:Archived 3465:Archived 3434:Archived 3409:Archived 3383:Archived 3378:BBC News 3332:PC World 3307:Archived 3234:Archived 3208:Archived 3179:Archived 3155:Archived 3129:Archived 3103:Archived 3079:July 22, 3073:Archived 3052:31 March 3046:Archived 3014:Archived 3010:16146219 2944:Archived 2839:Archived 2819:Archived 2750:Archived 2717:Archived 2692:Archived 2667:Archived 2642:Archived 2621:Archived 2605:62693275 2525:Archived 2430:Archived 2406:Archived 2363:18207001 2312:Archived 2288:Archived 2269:Archived 2246:Archived 2220:Archived 2193:archived 2163:Archived 2033:Archived 2008:Archived 1977:Archived 1942:Archived 1916:Archived 1886:Archived 1857:archived 1825:Archived 1799:archived 1766:Archived 1740:Archived 1712:Archived 1687:Archived 1619:Archived 1595:(2005). 1565:Archived 1536:Archived 1507:Archived 1393:Sporgery 1336:Phishing 1252:See also 1219:Bulgaria 1213:Bulgaria 997:trespass 983:and the 950:phishing 928:In crime 740:Vietnam 705:Country 561:Rickroll 55:phishing 39:Spamming 4561:SpamCop 4479:Spambot 4423:Spambot 4413:Joe job 4106:Spyware 4049:Payload 4044:Malware 3984:Viruses 3964:Botnets 3871:Threats 3588:Sources 3512:"Spams" 2566:1944093 2402:ITworld 1983:May 19, 1795:NPR.org 1411:History 1384:Spoetry 1358:SpamCop 1325:Malware 1137:Florida 1107:obscene 909:Benefit 891:damages 884:CAPTCHA 783:Brazil 729:Russia 565:malware 535:YouTube 511:attacks 503:weblogs 387:Quechup 271:ARPANET 261:History 243:History 163:of the 126:spammer 4300:(SIEM) 4277:(HIDS) 4161:Zombie 3898:Bombs 3879:Adware 3663:  3653:  3643:  3358:, 3008:  2998:  2980:  2603:  2564:  2412:1 June 2361:  2351:  2087:  2079:  1611:  1528:"Spam" 1148:Tacoma 1009:Yahoo! 918:botnet 844:threat 772:China 750:(tie) 718:India 682:Usenet 553:keygen 320:Usenet 290:Usenet 213:Usenet 179:Viking 161:sketch 158:"Spam" 85:spam, 4684:Voice 4639:Sping 4556:SORBS 4432:Other 4398:DNSWL 4393:DNSBL 4146:Worms 4141:Wiper 4059:Voice 3907:Logic 3017:(PDF) 3006:S2CID 2970:(PDF) 2864:(PDF) 2627:(PDF) 2601:S2CID 2562:S2CID 2552:(1). 2461:(PDF) 2359:S2CID 2315:(PDF) 2308:(PDF) 2143:7 May 2137:(PDF) 2130:(PDF) 2113:(PDF) 2106:(PDF) 2085:S2CID 2042:ZDNet 1622:(PDF) 1605:Japan 1600:(PDF) 1474:See: 1462:Notes 1352:SORBS 1160:Lagos 1099:fraud 990:block 721:13.7 702:Rank 515:wikis 358:Email 332:Panix 4489:VoIP 3912:Time 3902:Fork 3661:ISBN 3651:ISBN 3641:ISBN 3473:2011 3391:2011 3289:2014 3263:2014 3163:2010 3081:2002 3054:2020 2996:ISBN 2952:2018 2758:2011 2505:2012 2475:link 2414:2013 2383:help 2349:ISBN 2228:2018 2201:2008 2145:2014 2077:ISSN 2016:2014 1985:2023 1924:2017 1833:2010 1609:ISBN 999:and 893:and 870:Cost 823:The 813:SPAM 797:3.2 786:4.5 775:4.7 764:6.0 756:6.0 743:7.9 732:9.0 708:Spam 637:OvGU 635:and 517:and 419:and 190:MUDs 188:and 186:BBSs 175:cafe 154:spam 146:Spam 107:Spam 43:spam 3917:Zip 2988:doi 2797:doi 2593:doi 2554:doi 2522:PDF 2341:doi 2069:doi 2039:." 1679:doi 1133:USD 1091:AOL 952:). 604:is 583:or 324:NGO 165:BBC 4703:: 3605:. 3599:. 3518:. 3514:. 3457:. 3375:. 3330:. 3202:. 3101:. 3097:. 3040:. 3012:. 3004:. 2994:. 2986:. 2972:. 2942:. 2917:. 2883:^ 2866:. 2793:26 2791:, 2773:- 2748:. 2744:. 2599:. 2589:23 2587:. 2583:. 2560:. 2550:11 2548:. 2544:. 2513:^ 2491:. 2471:}} 2467:{{ 2436:- 2404:. 2400:. 2375:: 2373:}} 2369:{{ 2357:. 2347:. 2310:. 2218:. 2191:, 2187:, 2083:. 2075:. 2065:38 2063:. 2059:. 2006:. 2002:. 1975:. 1971:. 1957:^ 1914:. 1910:. 1880:. 1849:, 1793:, 1781:^ 1764:. 1727:^ 1710:. 1685:. 1677:. 1673:. 1617:. 1602:. 1591:; 1580:^ 1563:. 1559:. 1530:. 1505:. 1501:. 1101:, 1097:, 936:, 904:). 791:8 780:7 769:6 737:3 726:2 715:1 587:. 389:. 338:. 308:. 128:. 97:, 93:, 89:, 81:, 77:, 73:, 69:, 65:, 4345:e 4338:t 4331:v 3755:e 3748:t 3741:v 3616:. 3579:. 3554:. 3529:. 3500:. 3475:. 3443:. 3418:. 3393:. 3341:. 3316:. 3291:. 3265:. 3217:. 3185:- 3165:. 3138:. 3112:. 3083:. 3056:. 3026:. 2990:: 2954:. 2902:. 2877:. 2848:. 2799:: 2760:. 2726:. 2701:. 2676:. 2651:. 2607:. 2595:: 2568:. 2556:: 2507:. 2477:) 2463:. 2416:. 2385:) 2365:. 2343:: 2324:. 2255:. 2230:. 2204:. 2172:. 2147:. 2091:. 2071:: 2018:. 1987:. 1951:. 1926:. 1895:. 1867:. 1835:. 1809:. 1775:. 1749:. 1721:. 1696:. 1681:: 1631:. 1574:. 1545:. 1516:. 1350:( 897:. 748:4 27:.

Index

Email spam
Spam (disambiguation)

advertising
proselytizing
phishing
email spam
instant messaging spam
Usenet newsgroup spam
Web search engine spam
spam in blogs
wiki spam
online classified ads
mobile phone messaging spam
Internet forum spam
junk fax transmissions
social spam
advertising
Spam
Monty Python sketch
Internet service providers

Monty Python
Spam
"Spam"
sketch
BBC
Monty Python's Flying Circus
cafe
Viking

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.