Searching For John Doe: Finding Spammers and Phishers

نویسنده

  • Aaron E. Kornblum
چکیده

Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity of the person(s) responsible, filing a “John Doe” lawsuit and following up with thorough third-party discovery has been an effective strategy to unmask the perpetrator.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spam and the Ongoing Battle for Safe Communications

Managing spam is an increasingly critical function for businesses of all sizes. According to the February, 2007, issue of the Communications of the ACM, the overall volume of spam has increased from 10%, in 1998, to 80%, today [1]. The onslaught of spam significantly degrades the reliability of e-mail for business communication. Many web sites provide web-based e-mail forms instead of listing e...

متن کامل

Assessing and Improving the Safety of Internet Search Engines

Where Internet users go, attackers follow. Users embrace e-mail; then spammers fill their inboxes with junk mail. With the rise in online commerce, phishers trick them into giving up their passwords. Users find handy downloadable applications; adware vendors bundle them with pop-up-spewing add-ons. The rise of Internet search brings a new type of risk. Hostile Web sites might seek to harm users...

متن کامل

A Multi-layer Architecture for Spam-detection System

As the email is becoming a prominent mode of communication so are the attempts to misuse it to take undue advantage of its low cost and high reachability. However, as email communication is very cheap, spammers are taking advantage of it for advertising their products, for committing cybercrimes. So, researchers are working hard to combat with the spammers. Many spam detections techniques and s...

متن کامل

Classification of Phishers

Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...

متن کامل

NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System

Comment spam has become a popular means for spammers to attract direct visits to target websites, or to manipulate search ranks of the target websites. Through posting a small number of spam messages on each victim website (e.g., normal websites such as forums, wikis, guestbooks, and blogs, which we term as spam harbors in this paper) but spamming on a large variety of harbors, spammers can not...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005