The A to Z of spamming exposed

Powered by SC Magazine
 

Spammers are fans of the alphabet according to recent research – you’re going to start wishing your name was Zebedee.

While it used to be thought that the section of the address after the '@' was most important to spammers, research by Richard Clayton, an insecurity expert from Cambridge University's computer lab shows that the info before the '@' is equally as important.

Clayton’s report shows that those with names higher up the alphabet are actually more likely to receive spam than those lower down – so Anne can expect to get around 35 percent of spam email, while Zack may only get 20 percent.

'Rumplestiltskin' attacks are to blame according to Clayton – this is when spammers pick through the entire dictionary guessing names and sending millions of spam email to these addresses, most of which turn out to be real.

This explains why A gets more than Z, as the spammers obviously get bored by the close of the alphabet.

Although this research is based on some truth, it is not only the beginning of the dictionary that is targeted – scammers, phishers and guttersnipes will still target those with their email address pasted across the web, without forgetting unique cases.

Clayton does suggest however, if you are an Alex or Amy with a lot of spam then it might be worth changing your email name to something a bit further down the alphabet.

theinquirer.net (c) 2010 Incisive Media


The A to Z of spamming exposed
 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote