wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPEM

profile
Janhavi Shitap
Aug 26, 2022
0 Likes
0 Discussions
74 Reads

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps,television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.

1.Social networking spam

Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when that account owner follows the spammer back, it legitimizes the spammer.Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.

2. Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether.

Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications.

3. Social spam

Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.


Comments ()


Sign in

Read Next

Spotify

Blog banner

The IT Service Lifecycle

Blog banner

Raid and levels of raid.

Blog banner

Getting started with Android Studio

Blog banner

Life lesson

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Processes : Process description and control

Blog banner

The Right way of cooking

Blog banner

How To Secure Operating Systems ?

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

EID UL FITR

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Windows Operating System

Blog banner

Hey Aryan here

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

A Deep Dive

Blog banner

Topic: Sessions in Operating system

Blog banner

Information of meesho company

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Sweet Mango Murabba

Blog banner

Memory management

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Strengthening Active Directory Security

Blog banner

Security in Operating Systems

Blog banner

Deadlock

Blog banner

Developments in Modern Operating Systems

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Deadlock and starvation

Blog banner

Bit Coins

Blog banner

1.1 basic elements

Blog banner

Linux -V Server Virtual Machine

Blog banner

rupee

Blog banner

10 Interesting facts you should know!!!

Blog banner

Multithreading in Operating System

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Cyber Security in Data Breaching

Blog banner

Veg Mix Pickle

Blog banner

security controls

Blog banner

What is Amazon?

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Cache memory

Blog banner