Instant Tips to Kill Junk and Save Your Day - Spam No More

By Veronica Carrillo

A good portion, if not the majority of email traffic on the internet today is spam related. The subject matter of spam emails can include discounted Viagra, inexpensive Rolex watches, a surprise inheritance and any other type of scam imaginable. If your email address is more than a few years old or even only a few months, it is inevitable the spam will find its way into your in-box. You are not without hope though. The following tips and suggestions can help alleviate the influx of spam email messages.

The paper will provide an analysis of many modern anti-anti-spam techniques, accompanied by statistical reports and real-life examples. It will also outline some possible approaches to combat these often highly effective and thus increasingly 'popular' spam techniques. Although Internet spamming has been with us since as early as 1978 it first became more than a minor annoyance around September 1993, when America Online released AOL for Windows and the exponential expansion of the Internet began. At first, and for years subsequently, Usenet- and then email-based spam was very simple, consisting of unvarying ASCII messages sent from a limited number of IP addresses. Such simple 'plain text' spam required correspondingly unsophisticated approaches to blocking it. Content-based techniques such as keyword scanning and straightforward hashes (or 'signatures') over the message body were very effective, and at the connection level IP blocklist pioneers such as Spamhaus and MAPS helped turn spammers away before they could even ring the doorbell.

Since then spammers have developed a variety of methods to bypass the filters, having a counter-countermeasure for every anti-spam technique devised, targeting both connection- and content-level filtering. In the former case, huge networks of compromised home PCs, known as 'botnets', are the most well-known. But another trick employed recently (predominantly by so-called 'Nigerian' scammers) is effective not only against IP blocklists but also such emerging technologies as DomainKeys and SPF/Sender-ID. In this particular example the trick exploits a Yahoo! Mail service allowing new customers to inform their contacts of their new Yahoo! email address. The scammer pastes a big list of target email addresses, writes his plea for assistance in the 'personal message' area of the form (see Figure 1), passes the CAPTCHA ('Completely Automated Public Turing test to tell Computers and Humans Apart') test, and his email is dispatched from Yahoo!'s mail servers complete with valid SPF and DomainKeys information. Note that, while Yahoo! Mail claims to restrict the personal message to 100 characters, emails arriving on SophosLabs' spam traps at the time of writing indicate that the scammers have discovered a way to greatly exceed this limit. This technique is, of course, of limited utility and (presumably) longevity, but though the proportion of spam sent this way is negligible, this and similar exploits could be a thorn in the side of anti-spam filters relying solely on the connection-level approach. On the content front, obfuscation still lies at the heart of anti-anti-spam methodology. It's a well-known fact that given all the tricks spammers use to veil their words, it becomes possible according to one estimation to misspell 'Viagra' in more than 10^21 different ways. (That is, rather appropriately, over one sextillion combinations.) But modern spam has evolved many more sophisticated ways of mentioning the unmentionable.

In a business environment, email services are often hosted in house or outsourced. An organization or business may also want to standardize their email address format in a way that makes it harder for spammers to guess or discover legitimate email addresses.

Another good option for organizations that have a high volume of inbound emails is to enlist with an external to the organization spam filtering gateway service. This type of service receives all inbound emails and filters it before passing it on, majority spam free, to the final destination. An alternative to an external gateway spam filtering service would be to install spam filtering capabilities internally.

Lastly, make sure to implement safe computing practices on home or work computers. Ensure that anti-spyware or antivirus software is always installed and up to date. Encourage friends and colleagues to do the same to help prevent your email address from being harvested from a contact or address list on their computers via a backdoor Trojan or virus. - 31837

About the Author:

Protect Yourself From Email Scammers

By Gregg Housh

A lot of us are already very familiar with the annoyance of spam: unsolicited e-mail ads. In recent years, unwanted emails have evolved in an attempt to avoid increasingly advanced filters and wary consumers. We have put together a list of red flags to help you quickly spot emails that may be harmful to your PC and your bank account.

Suspicious attachments

Attaching files to an email is a quick and simple way to share files with your friends and family. The downside is that unscrupulous individuals can attach files like viruses and spyware in the hopes that an unwary recipient might download the file and infect their computer. If you receive an email with an attachment that you weren't expecting, be very careful about downloading the attachment or even opening the email.

Links that don't make sense

In an email that claims to be from Yahoo, a link to a specific page on Yahoo's site appears. So why does the text of the link not begin with "http://yahoo.com"? Because it's a scam. Many scam artists attempt to gain account information or even credit card numbers by pretending to be respectable websites asking for information about your account. These emails typically contain a link to a page where you can reset your password, confirm your credit card information, or log in to access some special new feature. To spot these bad links, you will need to look at the url: the address of the page that is being linked to. All urls begin with "http://" or "htpps://" and from there differ from website to website. If the url is not visible in the text of the link, you can hover your mouse over the link and the url will be displayed in the lower left corner of your web browser.

Emails about accounts that you don't have

Scam emails that disguise themselves as emails from major websites are betting on their recipients actually having accounts with that website in the first place. If you get an email about your facebook account when you never even signed up with facebook, the odds are very good that this is a scam or virus email.

Password reset requests you didn't send

One of the most common email scams currently is the fake password reset. These emails claim that you recently made a request for a new password, and direct you to a webpage where you can enter your "old" account name and password. You may be able to pick out these emails by the link urls or because you do not have the account that you would theoretically be resetting a password for in the first place. Even if you don't see anything wrong with the link or the account information, never respond to a password reset email that you did not specifically ask for.

Sender addresses that don't add up

An official email from YouTube.com will be sent from an account that ends with @youtube.com. If "joey5683426$$@ytmail.com" is sending you official updates about your YouTube account, it's a safe bet this is also a malicious email. If your email system hides sender information, you can change your settings to show full headers or usually click a link right in the email to show all of the sender information.

Money transfer plots

Frequently sent from Nigerian royalty, these emails claim that there is some enormous amount of money sitting in an account somewhere that the sender wants moved to the United States before something horrible happens to it. It's not unusual for these emails to be all in caps lock and poor English, although there are exceptions. These emails are scam attempts, trying to get your bank account information so that the sender can access your funds. No matter the pretense for the email, you should never share bank account information with anyone you don't know. Newer versions of these emails claim to be from "a member of your church."

Weird emails from friends

The most dangerous and difficult to pick out malicious emails are the ones that come from your friends and other contacts. Typically if you get a suspicious email from a friend or other contact, it's either because their PC has been infected by a virus or because their email account has been compromised. If you find an email from one of your contacts that contains strange characters in the subject, has attachments that you weren't not expecting, links to a file sharing site, or otherwise looks different from the emails you're used to from that person, take the time to contact them before clicking on any links or downloading any attachments.

Emails from yourself (that you didn't send)

These types of emails can be disturbing when you find them. If you find an email from your own account sitting in your inbox that you know you didn't send (and you have not given anyone else access to your account) immediately change your password and security question for your account. Next, check out your "sent mail" folder to see if any other emails went out that you were unaware of. Let everyone who received one of these suspicious emails know that you did not send the emails, that they should not read them or click any links or attachments and that you suspect your account was compromised. You can also let your email provider know about your concerns. If this problem comes back, your machine may be infected and require virus cleanup service.

As users and spam filters become more aware of these malicious emails, scammers will develop new schemes to get at your computer, bank account, and other information. The best weapon against these attacks is a healthy dose of skepticism, though even cautious users can fall victim to scams and viruses. If you believe you may have a compromised email account or infected computer, or if you just want to learn more about how to prevent these problems, give a professional a call. - 31837

About the Author:

Sign Up for our Free Newsletter

Enter email address here