Fighting Spam Randy Appleton Northern Michigan University

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Geneva Public Library February 15th, What is ? How many of you have had accounts before?
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
Spam Edward W. Felten Dept. of Computer Science Princeton University.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Google Apps: Google Mail Got Gmail?....Need Help? Mrs. Connor.
Methods for Stopping Spam James Lick
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Online Advertising By Paige Aspinall. What is Online Advertising?  Online advertising is a mean of promoting products and services using the internet.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Fighting Spam Randy Appleton Northern Michigan University
Unit 9 Communication Services
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Safe Internet Use Mark Wheatley CSI Onsite
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
SPAMMING BY VASILIS ODONTIDIS Please read carefully, This is secret and confidential. “It is true that I pray to GOD before I was pushed forward.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Marketing Management Policy Best Practices Deliverability Inbox Placement Marketing Tips/Ideas.
Tired of Spam? The solution is MailWasher
This PowerPoint presentation will show you how to use your productively and successfully.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Oconomowoc Rotary – Nov. 2, 2009 Presented by: Kate Winckler and Christy Lui Marketing On Demand LLC Effective Marketing
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
s By Jordon walker. Sending an attachment.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Telemarketing David Anderson. Explanation Telemarketing fraud is selling fake items or services via telephone.
Schools-On-I-Net and Google Apps for Education. Good-bye Yellow, Hello Blue Effective July 1, 2008.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
What are the Pros and Cons of Advertising Via Newsletters?
management management using Gmail Ceri Clark.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
GOOGLE LEARNING TO USE YOUR G-MAIL ACCOUNT.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
How To Change Your YouTube Gmail Account?. Process To Change YouTube Account Your address on YouTube is your Google Account .
Learn how to protect yourself against common attacks
Engage Your Audience with Cross Media Communications
What is it? Why do I keep getting from Barracuda? SPAM.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
It still works! Let’s learn why and how you can make it work!
Dark Arts of Deliverability
Presentation transcript:

Fighting Spam Randy Appleton Northern Michigan University

What is Spam Probably, it’s “unsolicited and unwanted commercial sent in bulk”.

Sometimes It’s Not Spam You did sign up for it. You accidentally signed up for it. You still don’t want it.

How Is It Delivered? Anyone can fake . 80% of all spam came from bot-nets –We helped Open relays are mostly gone. You can hire this done for you (see Google).

How Much Spam Is There? In absolute numbers An spam is sent to 600 addresses First large-scale spam sent to 6000 bulletin boards, reaching millions of people (June) 30 billion per day (June) 55 billion per day

How Much Spam Is There #2 As a percentage of the total volume of MAAWG estimates that 80-85% of incoming mail is "abusive ", as of the last quarter of The sample size for the MAAWG's study was over 100 million mailboxes.MAAWG More is coming!!!

Why They Spam Money Political causes. Money It’s fun Money

Sell You Something It’s just mass electronic marketing They give you a web site, you click over and buy the product. might even be targeted. weight loss.html

Does Selling By Work? Kodak settled a CAN SPAM suit with the FTC. Their Ofoto unit sent two million commercial messages that didn't comply with the CAN SPAM act. They didn't include a notice that it was an ad, opt-out info, and Kodak's postal address. They paid the FTC $26,000, the revenue they got.

Pure Fraud “There is a sucker born every minute.” Send to lots of people. Wait for sucker to respond. Convince them to give you money. Nigerian bank fraud

Identity Theft Send an message. Direct them with a bad URL. Capture their info. Reject login and send them to the right site. Microsoft says to manually check every link.

Identity Theft #2 An Example Who Did It.

Stock Manipulation Pick a small cap stock Buy some. Send spam telling people about the stock. Sell when price rises. stock-spam.txt spam-stock.jpg New York Times

Yes, Spam Works 5% response rate from sexual material. 0.02% response rate for drugs % response rate for Rolex Watches.

Avoiding Spam Don’t let them get your address. –Don’t use AOL, etc. –Don’t put address on web page. –Don’t use mailing lists. Throw away addresses. –Mailinator, spamgourmet, sneakermail Annoying …. but possible.

List Removal For a reputable company, you can always click “remove me from the list”. A disreputable company will merely take that to be confirmation you’re reading the . It’s a calculated gamble.

Auto Detecting Spam Blacklist Whitelist Bayesian Analysis Other Analysis These are all things your server does for you.

Blacklist A list of web sites from which you don’t take mail. Automatically interfaced to your server. Spamhaus Block List –Zelots –Many choices.

Defeating Blacklists The spammers can switch ISPs. The spammers can use a botnet.

Whitelist There is no global whitelist; you make your own. Your own contact group is a good start. Add your institution. Add people to whom you have sent mail. Semiautomatic at best. 

Bayesian Analysis Make two piles of mail: spam and ham. Find words or phrases that can be used to identify mail. Check all incoming mail for those phrases. Normally you get a starter database that can be customized.

Example Bayesian Analysis My friends don’t me about Viagra. They do me about Linux. The phrase “stupid freshmen” appears in to me. The phrase “hot freshman” does not. Result is a score.

Fighting Back Don’t. The nasty goes to an innocent. Or it confirms you exist. Or it bounces back to you.

Using Gmail filters. Gmail allows pop downloads. You can even forward the mail to Gmail to keep your old account name.

Summary