Sabtu, 19 Februari 2011

Twitter Researchers Step up "Fight Against Spam"

How to Stop Spam

How to Stop Spam
Paul Judge, chief research officer for Barracuda, noted that Twitter is an attractive target because it is both a social network and a search engine. Barracuda cited the example of Download-Heaven, a site that was using a Twitter account to push links to hosted shareware filled with malware and Trojans. 

In a presentation called 'The Dark Side: measuring and analysing malicious activity on Twitter', Barracuda Networks' research scientist Daniel Peck and chief research officer and VP of cloud services Dr Paul Judge claimed that with any website with user generated content there is a gap in trust among users, some of who are genuine and others who use them as a means to attack other users' accounts.

With account hijacking, what risk model is there? Peck said that millions of users accounts are created every day and for every 100 users, only one per cent had 1,000 or more followers. One example the company tracked was Download-Heaven, a site that was using a Twitter account to push links to hosted shareware filled with malware and Trojans. Barracuda looked for that sort of imbalance as it tracked a raw stream of data from Twitter. It also looked for accounts that had been unfollowed by a lot of users over time; such accounts have often been recognized by other Twitter users as bad news. 

What Barracuda found was that just 43 percent of Twitter users could be classified as "true". These were users that had more than 10 followers, friends, and tweets. Much like trying to game conventional search engines to get new eyeballs, scammers were adding topic tags and/or popular words and phrases to tweets to get them to show up in the "Trends" field on Twitter pages and higher up on Twitter's search results pages. 

To track how widespread this practice was, Barracuda began grabbing popular search terms on Twitter every hour, and doing searches for them on the site. Twitter accounted for 8 percent of this total, with the other search engines logging the remainder.

"Google didn't necessarily get better--there was more malware--basically Bing, Twitter, and Yahoo got worse. To Twitter's credit, the company has made several efforts to keep this malware at bay. It also employed its own link-shortening service that similarly vets links. The free Profile Protector scans both your Facebook and Twitter profiles and identifies users that are on the company's watch list.
By. How to Stop Spam



GSMA Will Recommend a "Mark as Spam" System

How To Stop Spam

How to Stop Spam
The GSM Association aka GSMA will recommend operators to join a program that lets mobile users to report spam messages. Operators like AT&T, Bell Mobility, Sprint and Vodafone had also participated.

Alan Ranger, vice president for Cloudmark's mobile marketing said that users can forward suspicious spam content to 7726, which spells out as spam in the numeric format.  Cloudmark will be selling and managing the spam report service. Once a user reports an SMS, the service blocks them from coming on to a mobile user’s cell phone. 

For users in the U.S., receiving five such unsolicited messages a day may not seem uncommon, according to messaging security firm Cloudmark. Users in Asian countries may find themselves deleting upwards of 50 unsolicited text messages in a single day.

Users were urged to forward any messages they suspected to be spam to “7726,” a text message short code that corresponds to the word spam. Most spammers buy up prepaid SIM cards, Cloudmark says, and send out spam messages until the card runs out.

An ongoing effort to reduce the message’s effectiveness is a necessity according to Cloudmark. Adult-oriented messages may redirect a user to a malicious phishing website. 
By. How to Stop Spam


Kamis, 17 Februari 2011

What is Spam

How To Stop Spam
How to Stop Spam
Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. However, if a long-lost brother finds your e-mail address and sends you a message, this could hardly be called spam, even though it's unsolicited. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

There is some debate about the source of the term, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam??" Like the song, spam is an endless repetition of worthless text. Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunchmeat Spam:

    * Nobody wants it or ever asks for it.
    * No one ever eats it; it is the first item to be pushed to the side when eating the entree.
    * Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people.
By. How to Stop Spam
 

More Link Spam Examples in Google

How to Stop Spam

How to Stop Spam
For today’s example, I will be looking at the Hot Tub industry where one of my clients has a significant interest and ranks well for many of the most sought after terms including “hot tub”, “hot tubs”, “spa” and “spas” as well as many other related permutations. Unlike JC Penny, ChooseHotTubsDirect is using a number of other link spam tactics to artificially inflate their Google rankings. Let’s take a look at some of the methods they’re using including blog comment spam, blog spam (splogs), and forum spam.

In one particular case, JC Penney was ranking first for the search term ‘Samsonite carry on luggage’, ahead of Samsonite’s own website. JC Penney also happens to be one of Google’s biggest buyers of paid search advertising.

To understand how JC Penney’s website was achieving these results, it is important to understand one aspect of how Google (and other search engines) rank websites. Search engines judge the importance of a website in part by the amount of links coming into it, and by the quality of those links. So, if your site has three incoming links, and your competitor’s has 3000, then all other things being equal, your competitor’s site will rank higher on Google for the same search term.

Google and other search engines use this measure of importance because mostly, it works. One basic example would be if you paid 3000 website owners to put links on their sites, pointing to your site, no matter what their sites were about.

This is the big question – Google had previously ‘punished’ JC Penney for other Black Hat SEO techniques, yet failed to pick up a relatively large black hat campaign that was keeping JC Penney in the number one spot on numerous highly valuable keywords for a four month stretch. What adds an element of conspiracy to the story is that as mentioned earlier, JC Penney pays Google considerable sums of money for paid search advertising through AdWords. The implication is clear – does Google turn a blind eye to black hat SEO methods used by its largest customers?
By. How to Stop Spam