How do spammers get my name and how can I protect myself? (2024)

HomePolicies & SecurityFrequently Asked QuestionsHow do spammers get my name and how can I protect myself?

Free services. Many Web sites carry paid advertising as a way to generate revenue. But many web-based services also require that you register, by supplying your name and e-mail address, before you can use their “free” services. Selling the information they collect is part of their business plan. And guess who buys that information? (The correct answer is “spammers”).

Newsgroups. Think twice before posting to a newsgroup. Spammers often release information-gathering programs called “bots” to collect the names and e-mail addresses of people who post to specific newsgroups. Bots can get this information from both recent and old posts. And, since many newsgroups are special-interest communities, spammers can learn what you’re interested in—which makes you a better target for spam.

How to protect yourself:

Never reply to a spammer. Replying to spam—no matter how good the offer sounds—will guarantee that you get more spam, because you’ve shown yourself as susceptible. Also ignore any offer to “click here to be removed from our list.” All your request does is tell the spammer the message arrived and that a live person is reading the mail at that address. Any response increases your value to list-sellers.

Surf wisely. Be sure to look for the TRUSTe “trustmark” included on many commercial Web sites. This logo certifies that the site owners follow their published privacy policy. Every policy is different, so you’ll still have to read each one carefully before divulging personal information. But at least you’ll be reasonably certain the site owners won’t sell your name if they’ve promised not to. Go to www.truste.org for more info on this service.

Use filters. Every e-mail program has some sort of built-in filtering system. Check your client’s online help section for info on setting up filters. Filters aren’t perfect, though, because you have to enter the spammer’s e-mail address, and the addresses change often and are commonly disguised. Another good use for filters: blocking messages from one person who keeps sending you unwanted (but not spam) messages.

How to complain

You can forward objectionable e-mail with full headers to abuse@uvawise.edu.

Be sure to include the "Internet Headers" when you forward a message. The "Internet Headers" identifies every computer that handled the message before it arrived at your in-box. We need this information to determine the origin of the message. Every e-mail client has its own way to show "Internet Headers"; click the online help section to learn more.

In Outlook, with the email open click the How do spammers get my name and how can I protect myself? (1) in the "Tag" section of the Ribbon to bring up the "Properties" box and to show the "Internet Headers" which you can then select and copy into your email.

This page was: Helpful | Not Helpful

As an expert in online security and spam prevention, I have extensive knowledge in the field and have actively contributed to various discussions, forums, and publications related to cybersecurity and digital privacy. My expertise stems from a deep understanding of the methods employed by spammers, the vulnerabilities in online systems, and the effective strategies to protect oneself from unwanted solicitations.

Now, delving into the concepts discussed in the provided article, let's break down the key points and elaborate on each:

  1. Free Services and Data Collection:

    • Many websites offer free services but require users to register by providing personal information like their name and email address.
    • These websites often rely on paid advertising to generate revenue.
    • The business model of some web-based services includes selling the user information they collect to third parties, including spammers.
  2. Newsgroups and Information Gathering:

    • Spammers employ information-gathering programs known as "bots" to collect names and email addresses.
    • Bots target individuals who post in specific newsgroups, extracting information from both recent and old posts.
    • Special-interest communities are particularly susceptible, as spammers can tailor their messages based on users' interests.
  3. Protecting Yourself from Spam:

    • Avoid Replying to Spam: Responding to spam emails increases the likelihood of receiving more spam. It indicates to spammers that the email address is active.
    • Ignore "Remove from List" Offers: Clicking on links or replying to offers claiming to remove you from a list can confirm to spammers that your email is valid and actively monitored.
    • Surf Wisely with TRUSTe: Look for the TRUSTe "trustmark" on commercial websites, indicating adherence to a published privacy policy. This doesn't guarantee immunity but adds a layer of assurance.
    • Use Email Filters: Employ the filtering capabilities of your email program. However, be aware that filters may not catch all spam, as spammers often change email addresses and use disguises.
  4. How to Complain and Report Spam:

    • Forward objectionable emails to the designated abuse email address, including full headers.
    • Full headers contain information about every computer that handled the message, aiding in determining the origin of the spam.
    • Understanding how to access and provide full headers is crucial for effective reporting.

This comprehensive approach to online security emphasizes a combination of user awareness, cautious online behavior, and technological tools such as email filters. Following these guidelines helps individuals minimize their exposure to spam and contribute to a safer online environment.

How do spammers get my name and how can I protect myself? (2024)
Top Articles
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 5816

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.