Spamming as cyber crime

G
gagan deepstudent
SPAMMING AS CYBER CRIME
INTRODUCTION
• SPAM- Sending spam emails sent to a large
number of Internet users without their
consent
• VIRUS- A harmful program hiding in other
innocent programs
• CYBER CRIME- Crime that is committed on the
internet
DEFINITION
• SPAM is defined as an unsolicited, unwanted,
postings on social network websites or suspicious
emails sent to a large number of users.
• Social Spam is unwanted spam content appearing
on social network and any website with user-
generated content (comments, chat, etc.). It can
be manifested in many ways, including bulk
messages, profanity, insults, hate speech,
malicious links, fraudulent reviews, fake friends,
and personally identifiable information.
• Spammer- A person who creates electronic
spam is called a spammer
HISTORY
• The first major commercial spam incident began on
March 5, 1994.
• In a few years, the focus of spam (and anti-spam
efforts) has shifted primarily to electronic mail, where
it still resides today. It can be argued that aggressive
spam emails from various high profile spammers like
Sanford Wallace of Cyber Promotions in the mid to late
1990s helped make spam primarily an email
phenomenon in the public mind.
• In 2009, the majority of spam emails sent worldwide
were in English. Spammers have started using machine
translation services to send spam in other languages.
TYPES
• E-mail
• Instant Messaging
• Mobile Phones
• Social Networking Spam
• Social Spam
• Spam Targeting Video Sharing Sites
• Academic search
• Mobile Apps
E-MAIL
• Email Spam, also known as unsolicited bulk email
(UBE), spam, or unsolicited commercial email
(UCE), is the sending of unwanted email
messages, often with commercial content, in
large quantities. to a set of indiscriminate
recipients. Spam in e-mail began to become a
problem when the Internet was opened to the
general public in the mid-1990s. It has grown
exponentially in the following years and today
represents between 80 and 85%. of all emails in
the world. according to a “conservative estimate”.
INSTANT MESSAGING
• According to a report by Ferris Research, 500
million spam instant messages were sent in
2003, double the 2002 level. Instant
messaging is rarely blocked by firewalls,
making it a particularly useful channel for
spammers. . This is very common in many
instant messaging systems such as like Skype
MOBILE PHONES
• Mobile phone spam targets the text messaging service
of a mobile phone. This can be particularly irritating for
customers, not just for the inconveniences, but also for
the costs which can be invoiced by SMS received in
certain markets.
• The term "SpaSMS" was coined on the adnews Adland
website in 2000 to describe spam. To comply with CAN-
SPAM regulations in the United States, SMS messages
must now provide the HELP and STOP options, the
latter completely terminating communication with the
advertiser by SMS.
SOCIAL NETWORKING SPAM
• Facebook and Twitter are not immune to messages
containing spam links. Spammers hack into accounts and
send fake links disguised as the user's trusted contacts,
such as friends and family.
• As for Twitter, spammers gain credibility by following
verified accounts like Lady Gaga's; When the account
owner follows the spammer, they legitimize the spammer.
• Twitter has studied which structures of interest allow its
users to receive interesting tweets and avoid spam, despite
the fact that the site uses the delivery model, in which all of
a user's tweets are broadcast to all. user subscribers.
Spammers, with malicious intent, post unwanted (or
irrelevant) information or spread false information on social
media platforms.
SOCIAL SPAM
• Extending beyond centrally managed social
media platforms, user-generated content is
increasingly appearing on commercial,
government and non-profit websites around the
world.
• Fake accounts and comments entered by
computers programmed to send social spam can
infiltrate these websites.
• Well-meaning and malicious human users can
violate website policies by sending profanity,
slurs, hate speech and violent messages.
SPAM TARGETING VIDEO SHARING
SITES
• In actual video spam, the uploaded movie is given a name and description
with a popular figure or event likely to attract attention, or within the
video a certain image is programmed to appear as the video thumbnail
image to fool the user. viewer, such as a still image from a feature film,
pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full
Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file
for a video game or something similar. The actual content of the video
ends up being totally alien, a Rickroll, offensive, or just a text on the
screen of a link to the site that is being promoted. In some cases, the link
in question may lead to an online survey site, a password-protected
archive file with instructions leading to the aforementioned survey
(although the survey, and the archive file itself, have no value and do not
contain the file in question), or in extreme cases, malware. Others may
upload videos presented in an infomercial-like format selling their product
featuring paid actors and testimonials, although the promoted product or
service is of questionable quality and would likely not pass the scrutiny of
a standards and practices department at a television station. or cable.
network
Screenshot from a spam video on
YouTube claiming that the film in
question has been deleted from the site,
and can only be accessed on the link
posted by the spambot in the video
description (if the video were actually
removed by YouTube, the description
would be inaccessible and the deletion
notification would look different)
ACADEMIC SEARCH
• Spam dexing refers to a World Wide Web practice of
modifying HTML pages to increase your chances of ranking
high in search engine relevance lists.
• These sites use “black hat” search engine optimization
techniques to deliberately manipulate their search engine
rankings. Many modern search engines have changed their
search algorithms to try to exclude the web pages that use
spam indexing tactics.
• For example, search bots will detect repeated keywords as
spam using grammar analysis. If it turns out that a website
owner spammed the website to falsely increase their page
ranking, the website may be penalized by the search
engines.
Mobile Apps
• Mobile Application Store spam includes
I. applications that have been generated
automatically and therefore have no specific
functionality or meaningful description.
II. the publication of several instances of the same
application to obtain greater visibility on the
application market.
III. applications that make excessive use of
unrelated keywords to attract users through
unwanted searches
SOLUTION
• There are different solutions to SPAM that you
can use, such as:
– Self solution
– White List Solutions
– Black List Solutions
– Software Solutions
– Heuristic Filters
– Content Filters
• Self solution
– The automatic solution implies that the user sees and eliminates
the SPAM in their mailbox.
– While it can be effective, it is time consuming and frustrating.
• Whitelist solution:
– Whitelists allow you to receive mail from senders in your
address book.
– Mail from senders who are not in your address book will be
stored in the spam folder.
– In some cases, mail from senders who are not in the address
book will be deleted.
• Blacklist solutions
– A blacklist contains domain names or email addresses of
companies called spammers.
– There is software available that helps you list known SPAM
domains or email addresses; these will be spammed or deleted.
• Software solution
– Software solutions have rules or are linked to Internet blacklists
– the software is usually installed on a computer or server.
– Examples of SPAM software solutions include BitDefender, Imail
or Mailwasher, ADWCleaner, ETC.
• Heuristic filters:
– A heuristic filter searches for characteristics, links, words and
phrases commonly used in SPAM.
– There are certain rules which are used in the program to
indicate whether the email is SPAM or not.
• Content Filters
– SPAM can also be indicated by the content of the email or web
page.
– Rules are used to decide whether the content is SPAM or not.
– The subject, attachments, headers, size and body content are
displayed to help decide if it is classified as SPAM
LAW AGAINST SPAMMING IN INDIA
PRESENTLY
• the Indian government has not yet enacted a
law that directly addresses the problem of
spam. The existing law in the form of the
Information Technology Act 2000 does not
contain any provision regarding the regulation
of spam, although it does regulate obscenity
covering the publication, transmission or
electronic publication of anything. material
that is obscene or that attracts obscene
people. to interest
CONCULSION
• SPAM is a long, frustrating and potentially
harmful Internet plug-in for your computer.
Take note of the ways to prevent SPAM from
cluttering your mailbox. At the same time,
make sure that your site is not seen as spam.
1 de 20

Recomendados

SpammingSpamming
SpammingYash Shrivastava
3.4K visualizações16 slides
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
25.3K visualizações19 slides
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
3K visualizações24 slides
Phishing Presentation Phishing Presentation
Phishing Presentation Nikolaos Georgitsopoulos
9.4K visualizações35 slides
Email ForensicsEmail Forensics
Email ForensicsGol D Roger
4.9K visualizações56 slides

Mais conteúdo relacionado

Mais procurados

Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi The TNS Group
1K visualizações10 slides
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
1.8K visualizações17 slides
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
14.8K visualizações20 slides
Cyber lawCyber law
Cyber lawUmang Maheshwari
26.8K visualizações20 slides
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
23.9K visualizações38 slides
Spam Spam
Spam Senchu Thomas
5.7K visualizações18 slides

Mais procurados(20)

Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group1K visualizações
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
hirakhalid23941.8K visualizações
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah14.8K visualizações
Cyber lawCyber law
Cyber law
Umang Maheshwari26.8K visualizações
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz23.9K visualizações
Spam Spam
Spam
Senchu Thomas5.7K visualizações
Web securityWeb security
Web security
Padam Banthia780 visualizações
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi6.5K visualizações
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna21.2K visualizações
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar14311.1K visualizações
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala89.8K visualizações
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
Creative Technology12.1K visualizações
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev78.1K visualizações
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
Jaya Kamnani25.8K visualizações
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin22.5K visualizações
SpoofingSpoofing
Spoofing
Sanjeev11.2K visualizações
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett17.2K visualizações
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo26.9K visualizações
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar7.3K visualizações
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology5.1K visualizações

Similar a Spamming as cyber crime

SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYMarketingatBahrain
3.9K visualizações46 slides
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptxShreyaKushwaha28
17 visualizações22 slides
PhishingPhishing
PhishingAjit Yadav
468 visualizações42 slides
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGAnkushKumarSingh12
49 visualizações10 slides

Similar a Spamming as cyber crime(20)

SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain3.9K visualizações
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha2817 visualizações
PhishingPhishing
Phishing
Ajit Yadav468 visualizações
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
Ashish Arora3.5K visualizações
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
Alan Simpers MBA M.ED103 visualizações
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
AnkushKumarSingh1249 visualizações
Digital literacy edpc605Digital literacy edpc605
Digital literacy edpc605
Barbara M. King1.6K visualizações
internet securityinternet security
internet security
Cheryl Tanicala-Roldan2K visualizações
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh200 visualizações
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
Chippy Thomas422 visualizações
Spamming   IctSpamming   Ict
Spamming Ict
siewying3.8K visualizações
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep2.7K visualizações
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
Symantec Italia368 visualizações
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com379 visualizações
Social Networking Pres Sic Sig 090211Social Networking Pres Sic Sig 090211
Social Networking Pres Sic Sig 090211
Justin Wilcox632 visualizações
Research Project MsResearch Project Ms
Research Project Ms
mafer23215 visualizações

Mais de gagan deep(20)

Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its concept
gagan deep1.1K visualizações
Theories of justiceTheories of justice
Theories of justice
gagan deep2.9K visualizações
Specific crimes under iccSpecific crimes under icc
Specific crimes under icc
gagan deep219 visualizações
Principle of complementarityPrinciple of complementarity
Principle of complementarity
gagan deep163 visualizações
Precedents concept and kindsPrecedents concept and kinds
Precedents concept and kinds
gagan deep659 visualizações
Law and legitimacyLaw and legitimacy
Law and legitimacy
gagan deep898 visualizações
Fiscal techniqueFiscal technique
Fiscal technique
gagan deep404 visualizações
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep148 visualizações
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep6.3K visualizações
Vicarious liability under criminal law Vicarious liability under criminal law
Vicarious liability under criminal law
gagan deep692 visualizações
Type of research method are used Type of research method are used
Type of research method are used
gagan deep142 visualizações
Trial process in ukTrial process in uk
Trial process in uk
gagan deep322 visualizações
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law
gagan deep962 visualizações
research Qualitative vs. quantitative researchresearch Qualitative vs. quantitative research
research Qualitative vs. quantitative research
gagan deep498 visualizações

Último(10)

H1B 2025 Predictions: Will There Be A H-1B Lottery Again?H1B 2025 Predictions: Will There Be A H-1B Lottery Again?
H1B 2025 Predictions: Will There Be A H-1B Lottery Again?
VisaPro Immigration Services LLC20 visualizações
Trademark-Case Study.pdfTrademark-Case Study.pdf
Trademark-Case Study.pdf
HetviJoshi46 visualizações
Megandco AestheticsMegandco Aesthetics
Megandco Aesthetics
dominiquebroder7810 visualizações
Right to Equality - Lecture PPTRight to Equality - Lecture PPT
Right to Equality - Lecture PPT
Prarthana 16 visualizações
Hiding From ACLN The Motley Fool.pdfHiding From ACLN The Motley Fool.pdf
Hiding From ACLN The Motley Fool.pdf
jamesmaredmond8 visualizações
5 Common H-1B Cap 2025 Filing Mistakes: How To Overcome Them?5 Common H-1B Cap 2025 Filing Mistakes: How To Overcome Them?
5 Common H-1B Cap 2025 Filing Mistakes: How To Overcome Them?
VisaPro Immigration Services LLC15 visualizações
How is the Inheritance Divided in Italy?How is the Inheritance Divided in Italy?
How is the Inheritance Divided in Italy?
BridgeWest.eu5 visualizações

Spamming as cyber crime

  • 2. INTRODUCTION • SPAM- Sending spam emails sent to a large number of Internet users without their consent • VIRUS- A harmful program hiding in other innocent programs • CYBER CRIME- Crime that is committed on the internet
  • 3. DEFINITION • SPAM is defined as an unsolicited, unwanted, postings on social network websites or suspicious emails sent to a large number of users. • Social Spam is unwanted spam content appearing on social network and any website with user- generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
  • 4. • Spammer- A person who creates electronic spam is called a spammer
  • 5. HISTORY • The first major commercial spam incident began on March 5, 1994. • In a few years, the focus of spam (and anti-spam efforts) has shifted primarily to electronic mail, where it still resides today. It can be argued that aggressive spam emails from various high profile spammers like Sanford Wallace of Cyber Promotions in the mid to late 1990s helped make spam primarily an email phenomenon in the public mind. • In 2009, the majority of spam emails sent worldwide were in English. Spammers have started using machine translation services to send spam in other languages.
  • 6. TYPES • E-mail • Instant Messaging • Mobile Phones • Social Networking Spam • Social Spam • Spam Targeting Video Sharing Sites • Academic search • Mobile Apps
  • 7. E-MAIL • Email Spam, also known as unsolicited bulk email (UBE), spam, or unsolicited commercial email (UCE), is the sending of unwanted email messages, often with commercial content, in large quantities. to a set of indiscriminate recipients. Spam in e-mail began to become a problem when the Internet was opened to the general public in the mid-1990s. It has grown exponentially in the following years and today represents between 80 and 85%. of all emails in the world. according to a “conservative estimate”.
  • 8. INSTANT MESSAGING • According to a report by Ferris Research, 500 million spam instant messages were sent in 2003, double the 2002 level. Instant messaging is rarely blocked by firewalls, making it a particularly useful channel for spammers. . This is very common in many instant messaging systems such as like Skype
  • 9. MOBILE PHONES • Mobile phone spam targets the text messaging service of a mobile phone. This can be particularly irritating for customers, not just for the inconveniences, but also for the costs which can be invoiced by SMS received in certain markets. • The term "SpaSMS" was coined on the adnews Adland website in 2000 to describe spam. To comply with CAN- SPAM regulations in the United States, SMS messages must now provide the HELP and STOP options, the latter completely terminating communication with the advertiser by SMS.
  • 10. SOCIAL NETWORKING SPAM • Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send fake links disguised as the user's trusted contacts, such as friends and family. • As for Twitter, spammers gain credibility by following verified accounts like Lady Gaga's; When the account owner follows the spammer, they legitimize the spammer. • Twitter has studied which structures of interest allow its users to receive interesting tweets and avoid spam, despite the fact that the site uses the delivery model, in which all of a user's tweets are broadcast to all. user subscribers. Spammers, with malicious intent, post unwanted (or irrelevant) information or spread false information on social media platforms.
  • 11. SOCIAL SPAM • Extending beyond centrally managed social media platforms, user-generated content is increasingly appearing on commercial, government and non-profit websites around the world. • Fake accounts and comments entered by computers programmed to send social spam can infiltrate these websites. • Well-meaning and malicious human users can violate website policies by sending profanity, slurs, hate speech and violent messages.
  • 12. SPAM TARGETING VIDEO SHARING SITES • In actual video spam, the uploaded movie is given a name and description with a popular figure or event likely to attract attention, or within the video a certain image is programmed to appear as the video thumbnail image to fool the user. viewer, such as a still image from a feature film, pretending to be part by part of a pirated movie, eg. Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO file for a video game or something similar. The actual content of the video ends up being totally alien, a Rickroll, offensive, or just a text on the screen of a link to the site that is being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (although the survey, and the archive file itself, have no value and do not contain the file in question), or in extreme cases, malware. Others may upload videos presented in an infomercial-like format selling their product featuring paid actors and testimonials, although the promoted product or service is of questionable quality and would likely not pass the scrutiny of a standards and practices department at a television station. or cable. network
  • 13. Screenshot from a spam video on YouTube claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description (if the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look different)
  • 14. ACADEMIC SEARCH • Spam dexing refers to a World Wide Web practice of modifying HTML pages to increase your chances of ranking high in search engine relevance lists. • These sites use “black hat” search engine optimization techniques to deliberately manipulate their search engine rankings. Many modern search engines have changed their search algorithms to try to exclude the web pages that use spam indexing tactics. • For example, search bots will detect repeated keywords as spam using grammar analysis. If it turns out that a website owner spammed the website to falsely increase their page ranking, the website may be penalized by the search engines.
  • 15. Mobile Apps • Mobile Application Store spam includes I. applications that have been generated automatically and therefore have no specific functionality or meaningful description. II. the publication of several instances of the same application to obtain greater visibility on the application market. III. applications that make excessive use of unrelated keywords to attract users through unwanted searches
  • 16. SOLUTION • There are different solutions to SPAM that you can use, such as: – Self solution – White List Solutions – Black List Solutions – Software Solutions – Heuristic Filters – Content Filters
  • 17. • Self solution – The automatic solution implies that the user sees and eliminates the SPAM in their mailbox. – While it can be effective, it is time consuming and frustrating. • Whitelist solution: – Whitelists allow you to receive mail from senders in your address book. – Mail from senders who are not in your address book will be stored in the spam folder. – In some cases, mail from senders who are not in the address book will be deleted. • Blacklist solutions – A blacklist contains domain names or email addresses of companies called spammers. – There is software available that helps you list known SPAM domains or email addresses; these will be spammed or deleted.
  • 18. • Software solution – Software solutions have rules or are linked to Internet blacklists – the software is usually installed on a computer or server. – Examples of SPAM software solutions include BitDefender, Imail or Mailwasher, ADWCleaner, ETC. • Heuristic filters: – A heuristic filter searches for characteristics, links, words and phrases commonly used in SPAM. – There are certain rules which are used in the program to indicate whether the email is SPAM or not. • Content Filters – SPAM can also be indicated by the content of the email or web page. – Rules are used to decide whether the content is SPAM or not. – The subject, attachments, headers, size and body content are displayed to help decide if it is classified as SPAM
  • 19. LAW AGAINST SPAMMING IN INDIA PRESENTLY • the Indian government has not yet enacted a law that directly addresses the problem of spam. The existing law in the form of the Information Technology Act 2000 does not contain any provision regarding the regulation of spam, although it does regulate obscenity covering the publication, transmission or electronic publication of anything. material that is obscene or that attracts obscene people. to interest
  • 20. CONCULSION • SPAM is a long, frustrating and potentially harmful Internet plug-in for your computer. Take note of the ways to prevent SPAM from cluttering your mailbox. At the same time, make sure that your site is not seen as spam.