TITLE

Antispam effort smacks of cyber-McCarthyism

AUTHOR(S)
Kobielus, James
PUB. DATE
March 1999
SOURCE
Network World;03/08/99, Vol. 16 Issue 10, p41
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the efforts of Mail Abuse Protection System to eliminate spamming on the Internet. Blacklisting of networks with management policies conducive to spam origination; Freedom of speech issue on requiring prior authorization to send e-mail.
ACCESSION #
2601019

 

Related Articles

  • New advances in securing cyberspace and curbing crowdturfing. Li, Gang; Niu, Wenjia; Batten, Lynn; Liu, Jiqiang // Concurrency & Computation: Practice & Experience;10/25/2017, Vol. 29 Issue 20, pn/a 

    No abstract available.

  • Spam Gets More Sophisticated--and Dangerous. Greengard, Samuel // Baseline;6/17/2014, p1 

    The article focuses on the rise in cyber attacks and data breaches. It reveals the advancement of digital technology and states that cyber crooks and online thieves have become more knowledgeable about information technology (IT) than the IT's executives. It also mentions the arrival of new...

  • Sorting through the mail. Jones, Joyce; Gray, Valerie Lynn // Black Enterprise;Oct98, Vol. 29 Issue 3, p165 

    Presents tips for avoiding mail fraud. Includes need to inspect envelopes thoroughly; Caution over suggestion of government connections; Tricks into buying advertisement in non-existent directories; Shipment of unordered office supplies or publications.

  • What are the odds of defeating spam? Davies, Hugh // Building Design;11/20/2009, Issue 1893, p21 

    The article focuses on how to eliminate computer spam. It says that anti-spam software does a lot of method to filter spam messages including keyword filtering, whitelists and Bayesian filtering. It notes that whitelist accepts messages from legitimate contacts, keyword filtering depends on the...

  • Tracking Social Spam.  // Technology Review;Jan/Feb2011, Vol. 114 Issue 1, p89 

    The article discusses research being done on social spam activity. It references the study "Detecting and Characterizing Social Spam Campaigns," by Hongyu Gao and colleagues which was discussed at the ACM Internet Measurement Conference in Melbourne, Australia on November 1-3, 2010. It states...

  • SECURITY ALERT!  // Web User;2/25/2015, Issue 365, p12 

    The article presents updates on Internet security as of February 25, 2015. Topics discussed include installation of the banking malware Trojan Dyreza on users' personal computers (PC) through spam electronic mail (email), use of a fake version of AdwCleaner to trick unsuspecting users into...

  • Spam, Mobile Malware Lead Security Trends of 2013. Kerner, Sean M. // eWeek;1/24/2014, p10 

    The article discusses major cyber security trends of 2013 as reported by security firm Crowdstrike in its 2013 Global Threat Report, by technology vendor Cisco in its 2014 Annual Security Report, and by information security firm Trustwave. The trends include the pervasiveness of spam e-mail, the...

  • Airline & Travel News - Travel Technology News • January 14, 2013.  // AirGuide Online.com;1/14/2013, p1 

    The article offers news briefs related to travel technology in the U.S. as of January 14, 2013. Perfect Citizen uses technology from Raytheon Co. as well as penetration testers to strengthen cybersecurity and protect critical infrastructure. The Federal Bureau of Investigation (FBI) has warned...

  • Phishing -- the Internet's obnoxious snare. Sardoni, Ken // Enterprise/Salt Lake City;9/6/2004, Vol. 34 Issue 11, p10 

    Offers advice on avoiding being deceived by phishing scams on the Internet. Validation of the legitimacy of the request; Importance of monitoring bank account and credit card statements when received for fraudulent charges; Suggestion on forwarding phishing spam electronic mail to the Federal...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics