wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPEM

profile
Janhavi Shitap
Aug 26, 2022
0 Likes
0 Discussions
74 Reads

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.

1.Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.

2. Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications.

3. Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.


Comments ()


Sign in

Read Next

Firewall

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Explain Kernel in OS

Blog banner

Blockchain uses and use cases

Blog banner

Business-to-Business

Blog banner

Vulnerability Assessment

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Importance of Website

Blog banner

INTERNET

Blog banner

Deadlock in operating system

Blog banner

Scheduling in Operating Systems

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

DURGA POOJA

Blog banner

Wedding photographer

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Evolution of Operating system.

Blog banner

Memory Hierarchy

Blog banner

The art of being alone

Blog banner

Linux

Blog banner

Dos (Denial of service) Attack

Blog banner

operating system

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Data Warehousing

Blog banner

Internet of Things

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

Software

Blog banner

Dr. Venkadavarahan

Blog banner

objectives and functions of operating system

Blog banner

Raid

Blog banner

Facebook marketing

Blog banner

Modern Operating system

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

child Labour

Blog banner

IT service level agreement

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Multiprocessor and scheduling

Blog banner