wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPEM

profile
Janhavi Shitap
Aug 26, 2022
0 Likes
0 Discussions
74 Reads

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.

1.Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.

2. Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications.

3. Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.


Comments ()


Sign in

Read Next

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Business-to-Business

Blog banner

Memory Management

Blog banner

E-learning in today's world

Blog banner

Critical success factors

Blog banner

USPS mail

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Virtualization

Blog banner

Outlook mail

Blog banner

Tableau

Blog banner

Cyber Laws In India and Around the World

Blog banner

The Memory Hierarchy

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Memory Management

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Deadlock

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Threading

Blog banner

Animal’s have my heart

Blog banner

Game via listing method

Blog banner

What is Spyware? and examples of them.

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Be kind person

Blog banner

Environmental Management using GIS

Blog banner

Article on Fresh Book

Blog banner

Multiprocessor and Multicore Organization

Blog banner

An Overview of Virtual Machines

Blog banner

internet email and it's applications

Blog banner

Disk Scheduling

Blog banner

PHISHING

Blog banner

Self defence

Blog banner

PPT methodology

Blog banner

About myself

Blog banner

File management

Blog banner

Life of an army person

Blog banner

Security Issues

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Constrained Management in IT

Blog banner

Cyber Security in Data Breaching

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

NETSUITE

Blog banner