wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPEM

profile
Janhavi Shitap
Aug 26, 2022
0 Likes
0 Discussions
74 Reads

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.

1.Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.

2. Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications.

3. Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.


Comments ()


Sign in

Read Next

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

File system

Blog banner

Random Forests

Blog banner

Friendship

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Dal Bafla Recipe

Blog banner

Life lesson

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

SAVE TREES

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Goa Trip With Friends

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Disk Scheduling

Blog banner

Memory Management

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Development Of Modern Operating System

Blog banner

Answer

Blog banner

Firewall

Blog banner

Deadlock and starvation

Blog banner

computer security

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

File Systems in OS.

Blog banner

Processes : Process description and control

Blog banner

The War With Cold On Earth

Blog banner

differentiate thinking humanly and rationally

Blog banner

S-Tool : Steganography

Blog banner

Malicious softwares

Blog banner

Memory Management in Operating System

Blog banner

A Deep Dive

Blog banner

MailChimp

Blog banner

Loneliness

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Cyber Security in Data Breaching

Blog banner

Texting is actually better than talking in person

Blog banner