The A to Z of spamming exposed

Powered by SC Magazine
 

Spammers are fans of the alphabet according to recent research – you’re going to start wishing your name was Zebedee.

While it used to be thought that the section of the address after the '@' was most important to spammers, research by Richard Clayton, an insecurity expert from Cambridge University's computer lab shows that the info before the '@' is equally as important.

Clayton’s report shows that those with names higher up the alphabet are actually more likely to receive spam than those lower down – so Anne can expect to get around 35 percent of spam email, while Zack may only get 20 percent.

'Rumplestiltskin' attacks are to blame according to Clayton – this is when spammers pick through the entire dictionary guessing names and sending millions of spam email to these addresses, most of which turn out to be real.

This explains why A gets more than Z, as the spammers obviously get bored by the close of the alphabet.

Although this research is based on some truth, it is not only the beginning of the dictionary that is targeted – scammers, phishers and guttersnipes will still target those with their email address pasted across the web, without forgetting unique cases.

Clayton does suggest however, if you are an Alex or Amy with a lot of spam then it might be worth changing your email name to something a bit further down the alphabet.

theinquirer.net (c) 2010 Incisive Media


The A to Z of spamming exposed
 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Five emerging technologies that will transform financial services
[Blog post] Far out ideas that aren't far off.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 934

Vote