MALWARE HISTORY

E-Mail Spam – 30 Years After

Read what is all about in a nutshell, then download The Story of E-Mail Spam

E-mail spam represents an unsolicited message, usually (but not always) of a commercial nature, indiscriminately sent to you and to a large number of other recipients by an unknown sender.

If you are reading these lines, you are probably one of the 1,407,724,920 people from this planet, according to a statistic published couple months ago, who own a computer and get online quite often. Chances are that you received this article or a link directing you here within an e-mail. And, most likely, this should also be true for the other several readers laying their eyes on the same paragraph by now.

You probably noticed some of them, by their names and e-mail addresses appearing next to yours in the header of the message I just mentioned. And, almost certainly, at least one or two guys from the To field are total strangers for you, if not all of them (not to mention the name appearing in the From field which, by the way, is not mine). There is also a very good chance for you not to be interested at all in receiving and reading this article, in which case I must humbly apologize in advance for wasting your time and patience, and respectfully assure you that this was not in any way my intention.

Technically speaking, an e-mail message bearing the features I outlined in the previous paragraph is called spam or bulk e-mail or just junk e-mail. An utterly unpleasant (post-)modern times invention that you, and me, and one fifth of the (Internet connected) world

About the author

Răzvan LIVINTZ

With a humanities passion and background (BA and MA in Comparative Literature at the Faculty of Letters, University of Bucharest) - complemented by an avid interest for the IT world and its stunning evolution, I joined in the autumn of 2003 the chief editors' team from Niculescu Publishing House, as IT&C Chief Editor, where (among many other things) I coordinated the Romanian version of the well-known SAMS Teach Yourself in 24 Hours series. In 2005 I accepted two new challenges and became Junior Lecturer at the Faculty of Letters (to quote U2 - "A Sort of Homecoming") and Lead Technical Writer at BluePhoenix Solutions.

After leaving from BluePhoenix in 2008, I rediscovered "all that technical jazz" with the E-Threat Analysis and Communication Team at BitDefender, the creator of one of the industry's fastest and most effective lines of internationally certified security software. Here I produce a wide range of IT&C security-related content, from malware, spam and phishing alerts to technical whitepapers and press releases. Every now and then, I enjoy scrutinizing the convolutions of e-criminals' "not-so-beautiful mind" and, in counterpart, the new defensive trends throughout posts on www.hotforsecurity.com.

Balancing the keen and until late in night (please read "early morning") reading (fiction and comparative literature studies mostly) with Internet "addiction", the genuine zeal for my bright and fervid students with the craze for the latest discoveries in science and technology, I also enjoy taking not very usual pictures (I'm not a pro, but if you want to see the world through my lenses, here are some samples http://martzipan.blogspot.com), messing around with DTP programs to put out some nifty book layouts and wacky t-shirts, roaming the world (I can hardly wait to come back in the Big Apple), and last but not least, driving my small Korean car throughout the intricacies of our metropolis's traffic.