Searching For John Doe: Finding Spammers and Phishers
نویسنده
چکیده
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity of the person(s) responsible, filing a “John Doe” lawsuit and following up with thorough third-party discovery has been an effective strategy to unmask the perpetrator.
منابع مشابه
Spam and the Ongoing Battle for Safe Communications
Managing spam is an increasingly critical function for businesses of all sizes. According to the February, 2007, issue of the Communications of the ACM, the overall volume of spam has increased from 10%, in 1998, to 80%, today [1]. The onslaught of spam significantly degrades the reliability of e-mail for business communication. Many web sites provide web-based e-mail forms instead of listing e...
متن کاملAssessing and Improving the Safety of Internet Search Engines
Where Internet users go, attackers follow. Users embrace e-mail; then spammers fill their inboxes with junk mail. With the rise in online commerce, phishers trick them into giving up their passwords. Users find handy downloadable applications; adware vendors bundle them with pop-up-spewing add-ons. The rise of Internet search brings a new type of risk. Hostile Web sites might seek to harm users...
متن کاملA Multi-layer Architecture for Spam-detection System
As the email is becoming a prominent mode of communication so are the attempts to misuse it to take undue advantage of its low cost and high reachability. However, as email communication is very cheap, spammers are taking advantage of it for advertising their products, for committing cybercrimes. So, researchers are working hard to combat with the spammers. Many spam detections techniques and s...
متن کاملClassification of Phishers
Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...
متن کاملNEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System
Comment spam has become a popular means for spammers to attract direct visits to target websites, or to manipulate search ranks of the target websites. Through posting a small number of spam messages on each victim website (e.g., normal websites such as forums, wikis, guestbooks, and blogs, which we term as spam harbors in this paper) but spamming on a large variety of harbors, spammers can not...
متن کامل