Web Hosting News

  Home arrow Web Hosting News arrow Page 4 - Image Spam on the Rise
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Image Spam on the Rise
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 5

    Table of Contents:
  • Image Spam on the Rise
  • Why is Image Spam So Successful?
  • A Closer Look at Image Spam
  • Blocking Image Spam

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Image Spam on the Rise - Blocking Image Spam

    (Page 4 of 4 )

    Fortunately, when it comes to catching image spam, all is not lost. Paul Bacca, a spam and virus researcher at Sophos, notes that "We see a lot of image spam and we know which computers are sending it," so they simply block mail from those computers. "We think we catch about 80% of image spam using these conventional techniques."

    Other techniques take advantage of the fact that these are, after all, images, and many of them are scanned into a computer. That means they contain information connected to the scanner that was used, such as the number of colors or pixels it uses. Adjust the spam filter to look for those colors and numbers, and suddenly you have a new metric for deciding whether or not a message is spam.

    A third technique acknowledges that, image or not, these emails contain text (in the sense of something that humans can read) - and tries to find ways for computers to recognize that text. This means using optical character recognition (OCR) techniques that can extract the text from the image. Once the text is extracted, conventional text filtering techniques can be applied to it. Sadly, that level of OCR is said to be a long way off. "You're looking at technology that is anything from 10 to 30 years away," notes Luis von Ahn of Carnegie Mellon University, one of the developers of the CAPTCHA technique.

    Spam filters can also detect and block image spam by examining certain attributes of the sending computer, message envelope and headers. As a general point, Scott Petry, Postini's founder and CTO, recommends that companies pay attention to the volume of incoming messages with image attachments. If a significant portion of these messages are getting through, the IT department may want to restrict their delivery because image spam is a potentially huge bandwidth problem. "You don't want those messages to undermine the availability of data in your enterprise," Petry explained. "It might mean some grumpy users, but at least the mail server will remain up and running." In short, to combat image spam, you will need to use filters that focus on both the content and the origin of the message.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates


    © 2003-2018 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap