|
|
Line 1: |
Line 1: |
− | ==What is spam?== | + | ==What is Spam?== |
| | | |
− | Spam is the electronic version of "junk mail," unsolicited e-mail that advertises a service or product and may contain malicious or unwanted software.
| + | Go to http://www.mywot.com/en/online-threats/spam for a full description of what is spam. |
− | | |
− | | |
− | ==Where does spam come from?==
| |
− | | |
− | Most spammers use spam to advertise, some use it to distribute viruses, trojans and worms while others simply use it to annoy. Email accounts are traditionally targeted most but recently spammers have become more innovative. Spam can now be found on blogs; instant messaging; social networking sites, such as MySpace and FaceBook; and even mobile phones.
| |
− | | |
− | | |
− | ==How does spam affect my computer?==
| |
− | | |
− | While spam may not necessarily contain viruses or malware, it is a nuisance and results in loss of productivity when you are forced to sift through unwanted messages every day. For large organizations it can mean loaded email servers that threaten the health and operation of their IT systems. In extreme cases, spammers have secretly commandeered computers with malware to act as an email server, which is then used to forward spam messages to other email recipients.
| |
− | | |
− | | |
− | ==How do I protect myself from spam?==
| |
− | | |
− | Spam is a common, and frustrating, side effect to having an email account. Although you will probably not be able to eliminate it, there are ways to reduce it. One way is through filtering spam using approved sender lists. For example, you can set Hotmail to deliver only messages from your contacts while the rest is sent to the junk folder. Other e-mail programs let you do the same thing through a filter rule. Remember to scan your junk folder occasionally.
| |
− | | |
− | ====Help reduce irritating spam:====
| |
− | | |
− | * Look for a company's privacy policy before submitting an email address. Every reputable company will have a link to their privacy policy explaining what they intend to do with your information.
| |
− | * When you sign up for online accounts or services, make sure you deselect optional choices selected by default.
| |
− | * If you follow links or reply to spam messages, you are confirming that your email address is valid and will get even more junk mail, so avoid the temptation to click.
| |
− | * Sign up for a challenge/response spam service.
| |
− | * Open a second email address specifically for online shopping, chat rooms, signing up for services, etc. to protect your primary address from accumulating spam.
| |
− | * Look at the WOT scorecard before clicking to an unknown site. The ratings and user comments can help protect you from a bad experience.
| |
| | | |
| | | |
Revision as of 20:07, 19 September 2009
What is Spam?
Go to http://www.mywot.com/en/online-threats/spam for a full description of what is spam.
Can any form of spam be distributed from my computer without my consent?
Yes, botnets are a type of potentially unwanted programs (sometimes classified as malware) that may be installed without your knowledge and may use your computer as a zombie computer to distribute spam. The originator of the botnet software can control and use them for other purposes. Botnets can be removed by running the latest anti-virus or anti-spyware software or blocked by using a firewall software.
How do botnets enter my computer without my consent?
Botnets can be installed by backdoors, drive-by-downloads, web exploits, worms, viruses and Trojan horses.