Spam Blocker Information |
How Spammers Fool Whitelists - And How to Stop Them
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be. One method used to combat spam is whitelisting. Whitelists are databases of trusted email sources. The list may contain specific email addresses, IP addresses or trusted domains. Emails received from a whitelisted source are allowed to pass through the system to the user's email box. The list is built when users and email administrators manually add trusted sources to the whitelist. Once built, the catch-rate for spam can be close to 100%, however, whitelists produce an inordinate number of false positives. It is virtually impossible to produce an exhaustive list of all possible legitimate email senders because legitimate email can come from any number of sources. To get around this difficulty, some organizations have instituted a challenge-response methodology. When an unknown sender sends an email to a user's account, the system automatically sends a challenge back to the sender. Some challenge-response systems require the sender to read and decipher an image containing letters and numbers. The image is designed to be unreadable by a machine, but easily recognizable by a human. Spammers would not spend the time required to go through a large number of challenge-response emails, so they drop the address and move on to those users who don't use such a system. Whitelists are only partially successful and impractical for many users. For example, problems can arise when users register for online newsletters, order products online or register for online services. If the user does not remember to add the new email source to their whitelist, or if the domain or IP address is entered incorrectly, the communication will fail. Additionally, whitelists impose barriers to legitimate email communication and are viewed by some as just plain rude. Whitelists are not widely used by email users and administrators as a primary tool to fight spam because of the high number of false positives, and the difficulties in creating a comprehensive list of email sources. Because whitelists are not widely used, spammers typically do not develop countermeasures. As with other spam fighting techniques, whitelists are most effective when used in conjunction with other anti-spam tools. The Solution When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers. Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting http://www.ciphertrust.com/products/spam_and_fraud_protection today.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
What To Do When You Get Spam When you go to your mailbox and find pieces of junk mail mixed in with important correspondence, you throw it out. It is a mild nuisance and you probably don't even give it a second thought. Protecting Yourself With A Porn Filter The harmful affects of pornography use and addiction are well documented by science. As with most things in life, prevention is the most effective way to avoid ever having a problem with pornography. Internet Theft and Fraud My friends in the web hosting business have recently informed me that the big problem this year (2004) is security and fraud. I have read that currently the F. How Spammers Fool Spam Blacklists - And How to Stop Them Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. Evict the Spammers from Your Inbox Block Spam and Other Email Threats From Entering Your GatewaySpam, commonly defined as unsolicited commercial email, is a powerful advertising channel for many products and services. As a result, spamming has become a profitable business, driven by the low cost of sending email compared to other direct marketing techniques. Ignoring These Tips Could Result in an Inbox Full of Spam Although there still seem to be some differences among the US Government, the lawmakers, the anti-spam organizations and the spammers regarding what is spam and what is not, identifying it is actually pretty easy: if you did not ask for it, you did not sign up on a mailing list related to it, and did not leave your e-mail address on a web form asking for more information on it?it's spam! The spam issue is not about content, but solely about delivery method. The content of spam is and has always been irrelevant. Internet Tip of the Week: Cease and Desist While we all admit that unsolicited commercial email is a real pain, I sometimes wonder if the anti-spam zealots are going too far. Last week I was in Costa Rica, and the only practical way to communicate home was by email. Email Spam and Phishing It seems like the volume of email spam has doubled in the last month. Increasingly, we receive daily emails for better mortgage rates, pharmaceutical discounts, and offers to enlarge body parts we don't even have. Kill The Messenger (Service) You are familiar with the software applications that you run on your computer, but you may not be familiar with the dozens of programs running in the background on your computer. These programs, called "services" handle tasks like event logging, spooling files to the printer, and networking. How Spammers Fool Whitelists - And How to Stop Them Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. SPAM: A Nutrious Food or a Waste of Time? Unless the filters on your computer are really good, you're getting at least an occasional SPAM message in your email Inbox. For most of us, we spend more time sorting through and deleting the SPAM than we care to. Stop Spam: How To Escape The Spam Hell-Hole If you're anything like me, you're pretty sick of it, and just want it to stop. What? Spam, of course. Where Did The Word Spam Come From? We've all become familiar with the term spam. It's become so commonplace that even people who never use computers are familiar with the term spam. Corporate Email Policies Lower Unnecessary Legal and Security Risks What comes to your mind when you think about your email? Email makes possible almost instant communication with your co-workers without leaving your desk, a quick note to a family member who lives far away, but also has a very annoying downside such as junk mail. Since the introduction of the Internet, email has been one of its primary uses. Is Your Website Blacklisted? A blacklist, as the name implies, is a list of people or companies who have met with the disapproval of others. In the online world a blacklist refers to those people who have been marked as responsible for generating spam in a very big way. I Love Spam! What's the big deal? All you read on the internet is spam, spam, spam. Spam protection this, spam protection that. The War on Spam: Google Fights Back Google is engaged in a war. It is a war on spam. Why Your ISP Takes Bribes From Spammers The lifeblood of the spammer is email. They need to be able to send lots of it on an ongoing basis to stay in "business". What to Do to Avoid Getting Banned How would you feel if you found a link on the web that was interesting to you but when you click the link it takes you to a page that is total rubbish? You are not only disappointed but it also wastes your time. Unfortunately, this is often true in many cases. Lockspam Free 3.0 Released! 6 August, 2004: Polesoft Inc., home of Professional anti spam software, announced today that Lockspam Free 3. |
home | site map | contact us |