Fighting internet abuse: things you can do

Tuesday, 30 July 2002, 11:43 AM EST

Minor network penetration attempts fall well beneath the threshold of viable lawsuits. Massive DoS attacks that bring down commerce servers for several days are a different story, But portscans, SubSeven Trojans, BackOrifice attacks and the like are not enough to show actual damage, other than a small amount of abused bandwidth.

The same goes for spam. While there are organizations - like The SpamCon Foundation - that promote methods to fight spam, users are, by and large, left to their own devices, short of filing a lawsuit against a spammer.

Certain states have passed laws that let you sue for each piece of spam received, if your mail server happens to reside in that state. But legislation likely will never prevent spammers from finding and exploiting open mail relays.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //