Feeds

'Together we can defeat spam in two years'

International rallying call

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Delegates at an International Telecommunication Union (ITU) spam conference this week have called for standardised, stronger worldwide anti-spam legislation. They aim control the 'modern day epidemic' of spam within two years.

Regulators from 60 countries along with industry representatives called for standardised legislation around the world to make it easier to prosecute spammers. Particular emphasis was placed on measures to curtail the flood of unsolicited pornographic email.

"(We have) an epidemic on our hands that we need to learn how to control," said Robert Horton, Internet strategy expert with the United Nations' International Telecommunications Union (ITU), AP reports. Horton confidently stated that the spam epidemic can be "defeated in short order" given "full international co-operation among governments and software companies".

Delegates will look at examples of legislation that can be used to combat the deluge of spam clogging up worldwide email systems. The initiative follows last week's announcement that the United States, the United Kingdom and Australia have signed a Memorandum of Understanding (MOU) to cooperate internationally in the fight against spam.

"This is great news, but legislation cannot solve the problem on its own," said Carole Theriault, security consultant at IT security firm Sophos. "Spam is mushrooming to incomprehensible levels. International legislation will help, but only in conjunction with sophisticated anti-spam software and education will the situation be rectified." ®

Related stories

US, UK and Australia sign anti-spam act
Sender authentication is coming
Europe drags heels in war on spam
Spammers not deterred by Can Spam Act
Phatbot arrest throws open trade in zombie PCs
The economics of spam

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.