Feeds

Hotmail's antispam measures snuff out legit emails, too

No warning, little recourse

Maximizing your infrastructure through virtualization

Microsoft representatives say the upsurge in spam - which they estimate to be about 40 per cent in the past year - has forced them to employ new techniques to safeguard Hotmail users and infrastructure. Once upon a time, messages were flagged largely based on the domain that sent it (e.g. Cyberpromotions.com) and by keywords - (think "get rich quick") that were embedded in them. With the growing use of image spam and botnets used to blast them to every corner of the globe, Microsoft has had to employ additional measures.

"The rules of deliverability have really changed," says Brian Holdsworth, senior product planner for Microsoft safety technologies, a group that is responsible for fending off the spam menace. "It's no longer just me, my email address and the domain I own. It's where I'm hosting it at and the reputation of my host."

Holdsworth was unfamiliar with Firth's case, but he speculates Firth's domain may be blocked because the provider hosting it may be home to a large number of infected machines. In such cases, all sites sitting on top of the host can be affected. Microsoft provides a service that allows hosts to review the reputation assigned to them by SmartScreen. (The service is not available to customers such as Firth.)

Microsoft representatives say they are making important progress in combating spam, having reduced the amount of junk mail landing in inboxes by half in the past year. What's more, of about 5bn messages sent to Hotmail users daily, as many as 4.5bn are spam. They say they are committed to resolving the problems such as Firth's and add that most large email providers are struggling with the same issues.

Perhaps, but according to Dominic Ryan, who runs a website called IIS-Aid, other providers do a better job. Ryan found that email his site tried to send to users with Hotmail addresses was also getting blocked, and he got to wondering how many other services might block his domain. So he set up a simple test in which he sent an identical email to accounts with ten different services.

Only one account - you can probably guess from which provider - failed to receive it.

"I have basically given up on Hotmail support," says Ryan, whose credentials include being a three-time Microsoft IIS MVP. He now bans the use of Hotmail addresses for users registering on his site and sends an automated response to those sending messages to fellow users with Hotmail accounts warning that the dispatches will probably not get through.

Of course, the biggest friendly-fire casualties in Microsoft's war on spam are the Hotmail users whose legitimate emails are killed before ever landing in their inbox. Firth and Ryan have been working diligently to alert these individuals to the problem, but so far they're warnings have gone unheeded. ®

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.