• 0
      1. Tu carrito está vacío.
    • artículo(s)0,00

What is Spam and how can it be controlled

November 7, 2019
November 7, 2019 Njla772

Spam is one of the most annoying types of advertisingWhat is the SpamAnd above all, how can we protect ourselves?


What is Spam? Some definitions and names

The Spam refers to the unsolicited e-mail. Some people include commercial calls and printed brochures in the mailbox, classifying them as spam.

Although they have in common that they can be annoying and unsolicited, in this post we focus on Spam in its more conventional definition, by electronic means.

It has certain characteristics that distinguish it from other types of unsolicited advertising, which we will see below.

"Unsolicited e-mail sent to a large number of recipients for advertising or commercial purposes."

    • It is also known as spam and spam message
    • It's a message unsolicited
    • It's an email unwanted
    • It comes from a unknown sender
    • It is sent from mass scale
    • Its purpose is usually advertising
    • But it is also an important channel of the cybercrime
    • It's very annoying


The origin - where did spam originate?

It all started with Monthy Python. Here it is told

The first case of spam without bacon on record was in 1978. Digital Equipment Corporation sent an announcement about its DEC-20 computer to users of ArpaNet, the forerunner of the Internet.

But it wasn'te until 1994 when the term "Spam”. Lawyers Lawrence Canter and Martha Siegel of Canter and Siegel publish a message on Usenet, which became known as the "Green Card Spam”. It is estimated that they won about $10,000.



Spam in all mailboxes

As mentioned above, spam is mainly sent by email. Other routes by which it arrives are the ads on websites such as blogs and on the search engines themselves and on the mobile phone.

  • Spam

It is sent through the email

  • Spim

Limited to the instant messaging applications

  • Spit

Via IP telephony. It consists of the use of the Internet as a means of making telephone calls

  • SMS Spam

This type of Spam is intended to be sent through mobile devices by SMS.


Characteristics of Spam

    • The address that appears as the sender of the message is not known to the user
    • Also, it's usually fake
    • The message usually has no reply address
    • It has an eye-catching subject "Urgent - Lottery Winners
    • Its content is usually advertising
    • Website Ads
    • Formulas to make money fast and easy
    • Miracle products
    • Real estate offers
    • Product promotions



cyber security series for ecommerce hosting secure web hosting

Who sends spam and for what purpose?

Spammer is the one who sends out spam.

The spammer uses different methods to get long e-mail lists. These are usually robots or automatic programs than looking up these addresses all over the web.

How do they get the addresses?

  • The web pages usually have the owner's email, but also visitors. In addition, they are published in forums, blogs,...
  • The mailing listslike joke mail and chain mail. "Forward it to 20 friends and you'll be lucky" In many cases, users forward the email without hiding the addresses (Bcc reminder). Therefore, the addresses can be captured by malware, such as a Trojan horse.
  • The web pages that request the email of the user to recommend it to their friends, to access services and downloads.
  • There is data sets of company and private addresses for sale. This is illegal in many countries.
  • The illegal entry into servers.


In addition, trial and error generates random email addresses. After sending, these messages are checked to see if they have reached their destination.

An example is making a list of domains and adding prefixes to them.

Web bugs and small images contained in the code HTML of the message help the spammer identify valid addresses.

This way, every time a recipient reads the message, it requests the image from the spammer's server. The spammer's server automatically logs it.



Objectives of Spam

Spam targets can be those of

Marketing, bidding and trying to arouse interest in a product


But you can also have criminal purposes.

That's why it can be dangerous to open an e-mail from an unknown address. It can be used to monitor the user, steal personal information.

The recipient's computer can even be used to launch computer attacks and send spam messages without the user's knowledge.

  • Phishing
  • Scam (the frauds that are presented through the Internet, including "Fake News")
  • Malware, Viruses and Spyware


Qué son y como protegerse de los Malware

How to protect yourself from Spam

  • Having an anti-spam filter

Most email services and managers have their own anti-spam filter. Visit our hosting services page for more information.

Ecommerce Hosting

We do not recommend sending chain letters. If you want to send or forward, you must do so using the Bcc, hidden copy option. This prevents the e-mail addresses from being seen.

The email publication on public websites makes it vulnerable. It should therefore be used with caution. A good practice is to create an email address for publication on public websites and a private email address.

We recommend do not open spam messages or preview them. Under no circumstances should it be answered. It is safer to delete messages from unknown addresses directly.

It is also not recommended to buy products offered in spam, to prevent fraud and reuses the email address in new spam campaigns.

A antivirus offers protection and help to keep your computer free of spyware and Trojans. The latter collect personal data to be sent to third parties.


Cómo elegir un antivirus gratis o de pago








Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Get in Touch

Subscribe to the newsletter on ecommerce and digital transformation

Trends, guides
and latest news in ecommerce

Además, te regalamos el primer capítulo del libro
«Conecta tu negocio. La transformación digital de los canales de venta»

Get in Touch




Connect your business.


In HUB 360 you will find all the technology and services for your e-commerce strategy.


Integra tu ecommerce con tu ERP sistema de gestión y todos tus canales para vender online.


BI Studio dashboards are your next generation business intelligence tool.


Proyecto Cofinanciado por el Fondo Europeo de Desarrollo Regional. Beneficiario: Conecta Software Soluciones SLU. Nº expediente: EATIC2019010001. Inversión Aprobada: 173.800,00 €. Comienzo: 01/04/2019. Finalización: 30/09/2020. El presente proyecto tiene como objetivo el desarrollo de una capa de usuario multilingüe y dashboards para entornos web y windows de solución de Business Intelligence.

Project co-financed by the European Regional Development Fund. Beneficiary: Conecta Software Soluciones SLU. File number: PI2019010001. Approved Investment: 6,444.80 Start date: 17/10/2018. Completion: 16/10/2019. The present project aims at developing a connector software that automates the generation of virtual catalogues so that the company can offer in its Online Store products with a wide description and with images that make the user experience richer and more complete.


English (UK)
English (UK) Español Deutsch