US-CERT Cyber Security Tip ST04-007 -- Reducing Spam

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                         Cyber Security Tip ST04-007
                                Reducing Spam

   Spam is a common, and often frustrating, side effect to having an email
   account. Although you will probably not be able to eliminate it, there are
   ways to reduce it.

What is spam?

   Spam is the electronic version of "junk mail." The term spam refers to
   unsolicited, often unwanted, email messages. Spam does not necessarily
   contain virusesâ??valid messages from legitimate sources could fall into this
   category.

How can you reduce the amount of spam?

   There are some steps you can take to significantly reduce the amount of spam
   you receive:
     * Don't give your email address out arbitrarily - Email addresses have
       become so common that a space for them is often included on any form
       that asks for your addressâ??even comment cards at restaurants. It seems
       harmless,  so many people write them in the space provided without
       realizing what could happen to that information. For example, companies
       often enter the addresses into a database so that they can keep track of
       their customers and the customers' preferences. Sometimes these lists
       are  sold  to or shared with other companies, and suddenly you are
       receiving email that you didn't request.
     * Check privacy policies - Before submitting your email address online,
       look for a privacy policy. Most reputable sites will have a link to
       their privacy policy from any form where you're asked to submit personal
       data. You should read this policy before submitting your email address
       or any other personal information so that you know what the owners of
       the site plan to do with the information (see Protecting Your Privacy
       for more information).
     * Be aware of options selected by default - When you sign up for some
       online accounts or services, there may be a section that provides you
       with the option to receive email about other products and services.
       Sometimes  there are options selected by default, so if you do not
       deselect them, you could begin to receive email from lists those lists
       as well.
     * Use filters - Many email programs offer filtering capabilities that
       allow  you  to block certain addresses or to only allow email from
       addresses  on your contact list. Some ISPs offer spam "tagging" or
       filtering services, but legitimate messages misclassified as spam might
       be dropped before reaching your inbox. However, many ISPs that offer
       filtering services also provide options for tagging suspected spam
       messages so the end user can more easily identify them. This can be
       useful in conjunction with filtering capabilities provided by many email
       programs.
     * Report messages as spam - Most email clients offer an option to report a
       message as spam or junk. If your has that option, take advantage of it.
       Reporting messages as spam or junk helps to train the mail filter so
       that the messages aren't delivered to your inbox. However, check your
       junk or spam folders occasionally to look for legitimate messages that
       were incorrectly classified as spam.
     * Don't follow links in spam messages - Some spam relies on generators
       that try variations of email addresses at certain domains. If you click
       a link within an email message or reply to a certain address, you are
       just confirming that your email address is valid. Unwanted messages that
       offer an "unsubscribe" option are particularly tempting, but this is
       often just a method for collecting valid addresses that are then sent
       other spam.
     * Disable  the automatic downloading of graphics in HTML mail - Many
       spammers send HTML mail with a linked graphic file that is then used to
       track who opens the mail messageâ??when your mail client downloads the
       graphic from their web server, they know you've opened the message.
       Disabling HTML mail entirely and viewing messages in plain text also
       prevents this problem.
     * Consider opening an additional email account - Many domains offer free
       email accounts. If you frequently submit your email address (for online
       shopping, signing up for services, or including it on something like a
       comment card), you may want to have a secondary email account to protect
       your primary email account from any spam that could be generated. You
       could also use this secondary account when posting to public mailing
       lists, social networking sites, blogs, and web forums. If the account
       start to fill up with spam, you can get rid of it and open a different
       one.
     * Use privacy settings on social networking sites - Social networking
       sites typically allow you to choose who has access to see your email
       address. Consider hiding your email account or changing the settings so
       that only a small group of people that you trust are able to see your
       address (see Staying Safe on Social Network Sites for more information).
       Also, when you use applications on these sites, you may be granting
       permission for them to access your personal information. Be cautious
       about which applications you choose to use.
     * Don't spam other people - Be a responsible and considerate user. Some
       people consider email forwards a type of spam, so be selective with the
       messages you redistribute. Don't forward every message to everyone in
       your address book, and if someone asks that you not forward messages to
       them, respect their request.
     _________________________________________________________________

     Authors: Mindi McDowell, Allen Householder
     _________________________________________________________________

     Produced 2004 by US-CERT, a government organization.

     Last updated July 29, 2009

     Note: This tip was previously published and is being re-distributed to
     increase awareness.

     Terms of use

     http//www.us-cert.gov/legal.html

     This document can also be found at

     http//www.us-cert.gov/cas/tips/ST04-007.html

     For instructions on subscribing to or unsubscribing from this mailing
     list, visit http://www.us-cert.gov/cas/signup.html.






-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSnCzm3IHljM+H4irAQJpdAf/ZSoWfQ6Y8AuX59nJOF1XhCyUkDiLpn9j
hkLiQmFA3HpYLWsFRhHaAzYA5yfNDZgJWPH30bn/NfltMxaMI//X+btavADyoKWz
niGtdFDWof9mn0mrMMHErT8awNEdrHVFbp1gtEagMzvzuo2j1Qp83i5a0fq9MJX6
dfQsM/tEh3NEm18ewtWXZBfJeOfe0y477l+zRf36arEYlcGHV+4ZTe5paqwZOKJ8
2NIKWylMl84WRv5W2D7vP0A03FaAGz1ZNTpH/sYlWD6iIiT1kEStk4rijjMYAcJF
JoYqjPh72AObcZ5pdCQYRwmXqxgsRsVc11TmGd+hNELWeJ+WR+ntCw==
=xvtz
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux