24d9243187032100deddb882a2e3ec33
Summary | |||
---|---|---|---|
Number: | KB0000029 | Workflow: | published |
Knowledge Base: | IT | Published: | 2014-09-09 |
Category: | |||
Author: | Ron Kettering | ||
Valid to: | 2100-01-01 | ||
Short description: | What is Spam? |
What is Spam?
Spam has increasingly become a problem on the Internet. While every Internet user receives some spam, email addresses posted to web sites or in newsgroups and chat rooms attract the most spam.'
Definitions
The term "spam" is Internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US Mail. Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:
- Phishing scams, a very popular and dangerous form of email fraud
- Foreign bank scams or advance fee fraud schemes
- Pyramid schemes, including multilevel marketing (MLM)
- Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
- Quack health products and remedies
- Ads for pornographic web sites
- Offers of software for collecting email addresses and sending UCE
- Offers of bulk emailing services for sending UCE
- Chain letters (see About chain mail)
- Illegally pirated software ("Warez")
To reduce the amount of spam you receive:
- Don't reply to spam
- Be careful releasing your email address, and know how it will be used
- Be proactive
Don't reply to spam
If you reply to spam, the spammer or the automated program on the other end will then know that your address is connected to a live person, and the spammer will then bombard you with even more spam, and circulate your address to other spammers. It is critical that you pause and think before replying to any spam. Consider the following guidelines:
- Setting up your email account to generate automatic responses while you are away can have the unfortunate side-effect of verifying your email address to every spammer that sends you spam.
- If the message appears to come from a legitimate company, the company may have obtained your email address from some transaction between you and the company. In fact, you may have inadvertently provided your email address (e.g., if you didn't check a box marked ). In these cases, it is usually safe to reply and ask to be removed from the mailing list.
- If it is not a company you recognize, use your judgment. To be safe, copy and paste the link to the company's site into the browser rather than clicking it in the email message.
- If the spam is clearly from a disreputable source, never respond. Do not follow the (probably bogus) unsubscribe directions. In most cases, if you never reply, the network of spammers will eventually decide your email address is a dud, and will stop using it as often.
Be careful releasing your email address, and know how it will be used
Every time you communicate on the Internet or browse a web site, there are opportunities for spammers to intercept your communications to obtain your email address and other personal information.
Otherwise reputable companies may sell or exchange your email address with other companies, and this information may eventually find its way to a spammer. At worst, spammers will use automated programs to bombard these lists of email addresses with spam. Consider the following guidelines:
- Subscribe only to essential discussion lists, and ensure that they are moderated.
- Think twice before offering your email address to a web site. You may wish to check the site's privacy policy first to be sure it uses secure technology, and that the company does not share your email address with others.
- If you need to list email addresses on your web site, present the addresses in a way that makes them less vulnerable to collection and abuse by spammers.
- Every time you are asked for your email address verbally or on paper, think carefully about whether or not you want to receive any information from that company or organization. It is usually best to decline to provide your email address.
- Whenever possible, advocate that organizations you are involved in or do business with default to the opt-in model. This requires you to specifically request to be added to their email lists, rather than the opt-out model, where they add you to email lists automatically, and then give you the option of asking to be removed.
Be proactive
Adjusting the security settings in your web browser is a good preventive measure. For a higher level of security, have your browser disallow:
- Accepting cookies
- Listing your name and other personal information in your browser profile
- Filling in form fields for you
This will help reduce the amount of personal information transmitted to sites at the expense of full functionality, since many legitimate web sites require you to accept cookies.
Do not contribute to the spam problem by producing any of it yourself! In particular, learn about chain mail and do not forward chain mail to others. Also, if you receive an email message that appears to warn of some horrible thing happening (a virus that reportedly deletes all your files, for example) or is a touching sob story (about helping to save a poor sick girl or boy, for example), be suspicious.
Nearly every instance of chain mail is a hoax. The message may even come from someone you know and respect who is simply not aware that it's a hoax. Learn about hoaxes and the sites available to verify hoaxes, and do not forward them to others.
Questions regarding X-rated spam (unsolicited mass e-mail)
Some members of the Company have at times expressed concern to IT regarding their own accountability for unsolicited e-mail of a sexual nature sent to their Company e-mail address. In some cases, an employee worries that a supervisor or co-worker might think the employee solicited the mail. In other cases, the person fears that an IT employee asked to assist with the computer might think the person had solicited the sexually-oriented mail.
Most people who either have experienced spam or have read about spam understand that spammers do not wait to be asked; they are in the business of aggressive marketing. Many spammers are deceitful, trying to fool people into opening their unwanted e-mail by pretending to be someone else or using a subject line which fools the recipient into opening the mail. Sometimes they claim falsely that the person is receiving the e-mail because the person asked for it, or expressed interest in material of a similar nature. The truth is that few people welcome spam and even fewer ask for it.
If a supervisor or co-worker thinks otherwise, IT can reassure them. Certainly, IT technicians and consultants understand that spam is a plague and not something invited by the recipient. As extra protection, depending upon how you receive your e-mail on campus, there are ways to quarantine spam and/or filter your incoming e-mail. It is advisable to immediately delete any such emails you receive.
- short_description
- What is Spam?
- roles
- wiki
- direct
- false
- rating
- description
- source
- ?
- my_source
- my_source_link
- Task.173669d567b032004792adab9485ef11
- sys_updated_on
- 2019-11-24 15:50:26
- disable_suggesting
- false
- sys_class_name
- kb_knowledge
- number
- KB0000029
- sys_id
- 24d9243187032100deddb882a2e3ec33
- use_count
- 0
- sys_updated_by
- bert.haddad
- flagged
- false
- disable_commenting
- false
- sys_created_on
- 2014-09-09 23:31:10
- valid_to
- 2100-01-01
- retired
- workflow_state
- published
- text
- <p><strong><span style="font-size: 18pt;">What is Spam?</span></strong></p>\n<p>Spam has increasingly become a problem on the Internet. While every Internet user receives some spam, email addresses posted to web sites or in newsgroups and chat rooms attract the most spam.'</p>\n<h2><span style="font-size: 12pt;">Definitions</span></h2>\n<p>The term "spam" is Internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US Mail. Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:</p>\n<ul><li>Phishing scams, a very popular and dangerous form of email fraud</li><li>Foreign bank scams or advance fee fraud schemes</li><li>Pyramid schemes, including multilevel marketing (MLM)</li><li>Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes</li><li>Quack health products and remedies</li><li>Ads for pornographic web sites</li><li>Offers of software for collecting email addresses and sending UCE</li><li>Offers of bulk emailing services for sending UCE</li><li>Chain letters (see About chain mail)</li><li>Illegally pirated software ("Warez")</li></ul>\n<p> </p>\n<p><strong><span style="font-size: 12pt;">To reduce the amount of spam you receive:</span></strong></p>\n<ul><li>Don't reply to spam</li><li>Be careful releasing your email address, and know how it will be used</li><li>Be proactive </li></ul>\n<h2><span style="font-size: 12pt;">Don't reply to spam</span></h2>\n<p>If you reply to spam, the spammer or the automated program on the other end will then know that your address is connected to a live person, and the spammer will then bombard you with even more spam, and circulate your address to other spammers. It is critical that you pause and think before replying to any spam. Consider the following guidelines:</p>\n<ul><li>Setting up your email account to generate automatic responses while you are away can have the unfortunate side-effect of verifying your email address to every spammer that sends you spam. </li><li>If the message appears to come from a legitimate company, the company may have obtained your email address from some transaction between you and the company. In fact, you may have inadvertently provided your email address (e.g., if you didn't check a box marked <span class="menuitem">Don't send me product updates</span>). In these cases, it is usually safe to reply and ask to be removed from the mailing list. </li><li>If it is not a company you recognize, use your judgment. To be safe, copy and paste the link to the company's site into the browser rather than clicking it in the email message. </li><li>If the spam is clearly from a disreputable source, never respond. Do not follow the (probably bogus) unsubscribe directions. In most cases, if you never reply, the network of spammers will eventually decide your email address is a dud, and will stop using it as often.</li></ul>\n<h2><span style="font-size: 12pt;">Be careful releasing your email address, and know how it will be used</span></h2>\n<p>Every time you communicate on the Internet or browse a web site, there are opportunities for spammers to intercept your communications to obtain your email address and other personal information.</p>\n<p>Otherwise reputable companies may sell or exchange your email address with other companies, and this information may eventually find its way to a spammer. At worst, spammers will use automated programs to bombard these lists of email addresses with spam. Consider the following guidelines:</p>\n<ul><li>Subscribe only to essential discussion lists, and ensure that they are moderated. </li><li>Think twice before offering your email address to a web site. You may wish to check the site's privacy policy first to be sure it uses secure technology, and that the company does not share your email address with others. </li><li>If you need to list email addresses on your web site, present the addresses in a way that makes them less vulnerable to collection and abuse by spammers.</li><li>Every time you are asked for your email address verbally or on paper, think carefully about whether or not you want to receive any information from that company or organization. It is usually best to decline to provide your email address. </li><li>Whenever possible, advocate that organizations you are involved in or do business with default to the opt-in model. This requires you to specifically request to be added to their email lists, rather than the opt-out model, where they add you to email lists automatically, and then give you the option of asking to be removed. </li></ul>\n<h2><span style="font-size: 12pt;">Be proactive</span></h2>\n<p>Adjusting the security settings in your web browser is a good preventive measure. For a higher level of security, have your browser disallow:</p>\n<ul><li>Accepting cookies</li><li>Listing your name and other personal information in your browser profile</li><li>Filling in form fields for you</li></ul>\n<p>This will help reduce the amount of personal information transmitted to sites at the expense of full functionality, since many legitimate web sites require you to accept cookies.</p>\n<p>Do not contribute to the spam problem by producing any of it yourself! In particular, learn about chain mail and do not forward chain mail to others. Also, if you receive an email message that appears to warn of some horrible thing happening (a virus that reportedly deletes all your files, for example) or is a touching sob story (about helping to save a poor sick girl or boy, for example), be suspicious.</p>\n<p>Nearly every instance of chain mail is a hoax. The message may even come from someone you know and respect who is simply not aware that it's a hoax. Learn about hoaxes and the sites available to verify hoaxes, and do not forward them to others. </p>\n<p> </p>\n<p><strong><span style="font-size: 12pt;">Questions regarding X-rated spam (unsolicited mass e-mail)</span></strong></p>\n<p> </p>\n<p>Some members of the Company have at times expressed concern to IT regarding their own accountability for unsolicited e-mail of a sexual nature sent to their Company e-mail address. In some cases, an employee worries that a supervisor or co-worker might think the employee solicited the mail. In other cases, the person fears that an IT employee asked to assist with the computer might think the person had solicited the sexually-oriented mail.</p>\n<p>Most people who either have experienced spam or have read about spam understand that spammers do not wait to be asked; they are in the business of aggressive marketing. Many spammers are deceitful, trying to fool people into opening their unwanted e-mail by pretending to be someone else or using a subject line which fools the recipient into opening the mail. Sometimes they claim falsely that the person is receiving the e-mail because the person asked for it, or expressed interest in material of a similar nature. The truth is that few people welcome spam and even fewer ask for it.</p>\n<p>If a supervisor or co-worker thinks otherwise, IT can reassure them. Certainly, IT technicians and consultants understand that spam is a plague and not something invited by the recipient. As extra protection, depending upon how you receive your e-mail on campus, there are ways to quarantine spam and/or filter your incoming e-mail. It is advisable to immediately delete any such emails you receive.</p>
- sys_created_by
- bert.haddad
- display_attachments
- false
- image
- sys_view_count
- 0
- article_type
- text
- cmdb_ci
- author
- Ron Kettering
- my_author
- Ron Kettering
- my_author_link
- SysUser.62d78687c0a8010e00b3d84178adc913
- can_read_user_criteria
- sys_mod_count
- 4
- active
- true
- cannot_read_user_criteria
- published
- 2014-09-09
- sys_domain_path
- /
- sys_tags
- meta_description
- kb_knowledge_base
- IT
- my_kb_knowledge_base
- IT
- my_kb_knowledge_base_link
- KbKnowledgeBase.A7e8a78bff0221009b20ffffffffff17
- meta
- topic
- category
- Tips and Tricks
- kb_category
- my_kb_category
- my_kb_category_link
- KbCategory.5681bf8bff0221009b20ffffffffff95
- my_sys_class_name_link
- KbKnowledge.24d9243187032100deddb882a2e3ec33