wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPEM

profile
Janhavi Shitap
Aug 26, 2022
0 Likes
0 Discussions
74 Reads

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.

1.Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.

2. Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications.

3. Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.


Comments ()


Sign in

Read Next

Expert System In AI

Blog banner

Boxing

Blog banner

Health and fitness in technology

Blog banner

Types of Big Data

Blog banner

Virtual Memory

Blog banner

Concurrency management in operating systems

Blog banner

Bit Coins

Blog banner

Components of GIS

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Fitness

Blog banner

Big O Notation

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

What are NFT s?

Blog banner

Uniprocessor scheduling

Blog banner

Operating Systems Overview

Blog banner

S-Tool : Steganography

Blog banner

Malware Defense

Blog banner

Process in OS

Blog banner

What is Virtual Memory

Blog banner

Traveling

Blog banner

The Evolution of Operating Systems

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Google

Blog banner

Modern OS

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Hacking of web server and application

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Data Lake

Blog banner

COMMUNICATION

Blog banner

The Features of Blockchain

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Deadlocks in operating system

Blog banner

Tracking Emails & Email Crimes

Blog banner

Understanding Business Layer in Data Science

Blog banner

What is process

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Study of Backdoor and Trojan tools

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Service Catalogue Management

Blog banner