The Most Common Types of Spam

Filed in Uncategorized by on December 24, 2013

Advertising Some companies engaged in legal business, advertise their products or services using spam. They can carry out its own newsletter, but more often ordered her to those companies (or individuals) who specialize in this. The attractiveness of such advertising is its relatively low cost and (presumably) a large scope of potential customers. Such unsolicited advertising may have the opposite effect, causing rejection of the recipients, and may even become synonymous with intrusive advertising, as happened with ham SPAM. In connection with the sharp rejection of the spam recipients, and the tightening of legislation antispamovogo share of legal goods and services in the total volume of spam is decreasing. It is believed that, with proper organization of promotional mailings, they can actually increase sales, not delivered to the recipient of special concern.

The principal terms of mutual benefit to the recipient and the organizer of distribution are: combining the roles of organizer and dispatches e-mail service provider; improving the quality of the target audience of each specific distribution of advertising messages; warning customers of the provider that he would send out promotional messages; providing convenient means to block unwanted messages. It should be noted, however, that the advertising message distributed to users with their consent, by definition, are not spam. Advertising illegal products With the help of spam frequently advertised products, which can not communicate in other ways – such as pornography, counterfeit (fake) products, medicines with the restrictions on traffic in illegally obtained private information (databases), infringing software. Nigerian letter Sometimes spam is used to enticed out money from the recipient of the letter.

The most common method is called «Nigerian letter», because a large number of these letters came from Nigeria. This letter contains a message that the recipient of the letter can be in any way a large sum of money, but the sender could help him in this. Then, the sender of the letter asked him to transfer some money under the guise of, for example, documentation or open an account. Vymanivanie this amount is the object of the bully. A narrower called this type of fraud – Bench or benches 419 (number of articles in the Criminal Code of Nigeria). Phishing «Phishing» (engl. phishing from fishing – fishing) – another way of fraud through spam. It is an attempt by spammers enticed out of the recipient’s letter of credit card numbers or passwords access to online payments. This letter is usually masked by an official communication from the administration of the bank.

It states that the recipient must confirm details about yourself, or else his account will be blocked, and provides the address map (of spammers) to the form to be filled. Among the data that is required to report are present and those that need fraudsters. To ensure that the victim does not have guessed about the deception, clearing the site also simulates the design of the official site of the bank. Other types of spam Letters of happiness The proliferation of political advocacy. Mass mailing list for the withdrawal of the postal system (DoS-attack). Mass mailing on behalf of another person in order to cause a negative attitude to it.

Mass mailing of letters containing a computer virus (for primary distribution). Our letters of Family History (as a rule, the sick, or victims of the accident the child) with the information that for every forward letters to some Internet service provider allegedly paid to the family of the victim a sum of money «treatment». The purpose of this list is to collect e-mail addresses: after numerous peresylok «all friends» in the text of the letter often contains the e-mail addresses of all whom it has been forwarded previously. And among the regular recipients may be initiated and its spammer. There are also two types of mass mailings, which are usually not included in the category of spam, because they operate unconsciously. However, they pose the same (or even more serious) problem for network administrators and end users.

Malicious programs a certain type (e-mail worms) are distributed via email. Infect another computer, the worm scans the computer to search for e-mail addresses and sends itself to those addresses. Some antivirus programs and spam filters, receiving contaminated letter sent to the return address of a notification of the virus (while mailing worms often substitutes as a return address randomly selected). As a result, dozens of people, not related to the dispatch, receiving reports that their computers are infected. However, this behavior may occur only with very old programs – were released before the problem of spam on the Internet rose to his full height.