Feeds

ISPs gang up on spammer-run websites

The LINX effect

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

UK ISPs are targeting ecommerce websites run by spammers in a new ‘get tough’ policy on junk mail. ISPs belonging to the London Internet Exchange (LINX) have voted through acode of practice which gives them the mandate to shut down websites promoted through spam, even if junk mail messages are sent through a third-party or over a different network. The move is intended to remove the financial incentive to send spam.

LINX is also calling on ISPs to take down websites used to sell spamming tools, such as CDROMs containing millions of illegally-collected email addresses. The code of practice changes were voted through at an extraordinary general meeting of LINX, which handles more than 90 per cent of the UK’s Internet traffic.

LINX regulation officer Malcolm Hutty said: "This represents an ever tougher approach to spammers. ISPs are not just trying to avoid their own users sending spam, we want to put the spammers out of business altogether."

Many UK ISPs already close 'spamvertised' websites under their terms of service. However, because most spamvertised web sites are hosted in the overseas countries where the spam also originates, the success of this new initiative depends on LINX pressuring ISPs overseas into adopting more rigorous practices. According to recent research (like this study from spam filtering firm CipherTrust), less than one per cent of spam now originates in the UK and less than 20 per cent in Europe as a whole.

Hutty said: "The new BCP (Best Current Practice) will raise the baseline, making the worldwide acceptable minimum standard tougher. We will be working to spread this standard beyond the UK and asking for support from the UK government at WSIS (the World Summit on the Information Society), OECD and other international forums." ®

Related stories

Summer spammers get raunchy
OECD unveils Spam Task Force
London schoolkids drown in spam tsunami
Spam poetry: transcending the junk mail paradigm

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.