Feeds

Renegade spammer targets junk mail registry

Red mist over Blue Security

Build a business case: developing custom apps

Users of Blue Security's controversial anti-spam system have begun receiving email threats that they'll end up getting even more junk mail unless they opt-out of its network.

Blue has created a "Do Not Intrude Registry" (akin to the Do Not Call Registry for telemarketing) with around 450,000 members. Participants download a small tool, called Blue Frog, which systematically floods the websites of spammers with opt-out messages. Depending on your point of view, this initiative can either be viewed as community action or vigilantism.

Earlier this week, members of the Blue community received aggressive spam messages from an unknown group in an attempt to intimidate users into dropping out of Blue Security's network. Blue Security (somewhat hyperbolically) described the attempted intimidation as "spam terrorism". And, in a nice piece of spin, claims that spammers' reaction to its service validates the firm's approach. It claims six out of 10 spammers comply, or are in the process of complying, with Blue’s Registry.

Even though a portion of members received the belligerent message, Blue Security is keen to play down fears that its email database has fallen into the hands of spammers.

Founder and CEO of Blue Security Eran Reshef said: "Blue Security’s Do Not Intrude Registry is encrypted and individual member emails are not exposed to would-be spammers. The renegade spammer that sent today’s email is using scare tactics and outright lies to further his agenda – to stop the growth of the Blue Community. Our members are not in any jeopardy of 'exposure' as the spammers already have their addresses. That is why they joined the Blue Community – to stop spam at its source by seeking compliance with the registry." ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?