How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore.

Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be.

One method used to combat spam is whitelisting. Whitelists are databases of trusted email sources. The list may contain specific email addresses, IP addresses or trusted domains. Emails received from a whitelisted source are allowed to pass through the system to the user's email box. The list is built when users and email administrators manually add trusted sources to the whitelist. Once built, the catch-rate for spam can be close to 100%, however, whitelists produce an inordinate number of false positives.

It is virtually impossible to produce an exhaustive list of all possible legitimate email senders because legitimate email can come from any number of sources. To get around this difficulty, some organizations have instituted a challenge-response methodology. When an unknown sender sends an email to a user's account, the system automatically sends a challenge back to the sender. Some challenge-response systems require the sender to read and decipher an image containing letters and numbers. The image is designed to be unreadable by a machine, but easily recognizable by a human. Spammers would not spend the time required to go through a large number of challenge-response emails, so they drop the address and move on to those users who don't use such a system.

Whitelists are only partially successful and impractical for many users. For example, problems can arise when users register for online newsletters, order products online or register for online services. If the user does not remember to add the new email source to their whitelist, or if the domain or IP address is entered incorrectly, the communication will fail. Additionally, whitelists impose barriers to legitimate email communication and are viewed by some as just plain rude.

Whitelists are not widely used by email users and administrators as a primary tool to fight spam because of the high number of false positives, and the difficulties in creating a comprehensive list of email sources. Because whitelists are not widely used, spammers typically do not develop countermeasures. As with other spam fighting techniques, whitelists are most effective when used in conjunction with other anti-spam tools.

The Solution

When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.

Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting enterprise anti spam solution today.

rental limo Atlanta .. Lockport Chicago limo O’Hare
In The News:

A Texas company is developing a hypersonic jet, Stargazer, that could fly from New York City to London in under an hour, redefining boundaries of aviation.
Porch pirates are on the prowl this holiday season. Tech guru Kurt "CyberGuy" Knutsson has a number of tips to prevent holiday package thefts.
Fueled by artificial intelligence, CyberDog the robotic dog is designed specifically locate fire ant nests, which are endangering ecosystems.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Internet browsers are useful, but they can be dangerous. Clicking on malicious links can direct you to dangerous websites that steal information or infect your device.
Apple's latest iOS update introduces advanced artificial intelligence capabilities, which may be capturing and analyzing sensitive information.
Breach site confirmed 56,904,909 Hot Topic users' data leaked online. Tech expert Kurt “CyberGuy" Knutsson says the company's silence makes matters even worse.
Tech expert Kurt “CyberGuy" Knutsson discusses how an innovative Easy-Way kit turns standard strollers electric, simplifying navigation for parents.
Tech expert Kurt “CyberGuy" Knutsson talks about T-Mobile being hacked in broad cyberattack on global phone and internet companies.
Tech expert Kurt “CyberGuy" Knutsson shows you how to add, customize and manage widgets for quick access to apps and info from your iPhone home screen.
Wrong Google searches can not only compromise your device and personal data. They can also bring law enforcement to your doorstep. Hackers are targeting Google searches.
China's Shanghai Kepler Robotics has developed a new humanoid robot that can carry up to 35 pounds per hand for commercial applications across various industries
Checking your hearing has gotten easier with the new hearing test feature in AirPods Pro 2. You can take reliable hearing tests using your iPhone or iPad.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how a VPN — virtual private network — works and how running it can slow down the operation of your device.
The WalkON Suit F1, an exoskeleton developed to help people with disabilities, can actually walk over to a person in a wheelchair, solving a major problem.
ClickFix, a new scam targeting computer users, is on the rise in the U.S. The scam prompts its targets to click on a link to fix a problem.
Skydweller is the world's largest unmanned solar-powered aircraft that can stay airborne for weeks, and even months, without refueling.
The U.S. government said it is investigating after People's Republic of China hackers targeted commercial telecommunications service providers in the U.S.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Scammers are using increasingly sophisticated ways to lure unsuspecting victims, and some are impersonating an email help desk or support team.
You can unsend or edit your iMessages with the latest iOS updates. Kurt the CyberGuy explains how you can save yourself some potential embarrassment.
Kurt “CyberGuy" Knutsson says there’s been a rise in cybercriminal services using hacked police and government emails to send subpoenas and data requests to U.S. companies.
Kurt “CyberGuy" Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design.

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

How Can I Stop Getting Spam?

Are you getting too much spam? We all are, but... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

Kill The Messenger (Service)

You are familiar with the software applications that you run... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Fight Spam and Fortify Your Web Site with RSS

RSS is the answer to the Spam epidemic of the... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

How To Stop Spam (Especially If You?re Already a Victim)

Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Is Spam Affecting Your Business Email?

5 Ways Spam Is Affecting Your Business And what we... Read More

Spam with Typos: Why Do They All Have Spelling Errors?

A friend asked me: I don't get it. Why do... Read More

How to Protect Your Email ID from Spammers?

You must be one of them experiencing a lot of... Read More

Edating Readers

One of our Australian clients sent out a campaign using... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

What Is Spam?

If you've been around the interenet any length of time... Read More

Quickly Eliminate 100% of Your Junk Email

Why do so many people think I need to take... Read More

The Great Spam Scam: Five Strategies To Stop Brand and Revenue Robbery

Marketers usually think of anti-spam tactics as 'how to prevent'... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

Stop Spam! New Spam Blockers

News last week that Internet service provider Verizon settled its... Read More

Bedford Park taxi to Midway ..