Feeds

Why is Hotmail so bad at spam?

Tell me why, I don't like Hotmail...

  • alert
  • submit to reddit

Seven Steps to Software Security

Column I'm trying very hard to be sympathetic towards Hotmail, and I'm failing, badly.

It's not the Microsoft connection that makes me fed up, it's just Hotmail.

Here's today's inbox:

From my contacts: 2 (2)
Marquita@viagra.com RE: Online Canadian Pharma...
admin@speedtrader.co... RE: Daily News

If you believe I have a contact called Marquita at viagra dot com, you're mad. I can't think of a single email provider who would not intercept ANY mail from that address and shoot it on sight. Letting the mail through is a trivial blunder, however, compared with allowing such a person to claim "contact status" with me.

A list of contacts in Hotmail is a list of people you acknowledge as contacts. Not just someone who writes an email saying; "I'm a contact!" in a bright cheerful voice, but someone whose credentials have been checked and validated by you.

In my inbox are some choice emails. One is from GIRLS WANNABE <girslwannaotjllluv288@yahoo.com>

Yes, Girls Wannabe - not in any way an unlikely name for a legitimate email sender, you're bound to agree? An offer of a Spanish camp for adolescents. All looks pretty innocent...I'm not going there to find out whether it is.

I have a letter from <admin@newloto.com> which may well be information about my recent enrichment. One more lottery win. I wouldn't know where to put the money if they were all legitimate.

Again, you'd think any spam service worth a damn would choke straight away on the word "loto" before it spotted the content. You'd certainly think it would recognise the content, because it's perfectly obvious that this was not sent just to me personally, but to a million recipients.

Then there's the message which begins: "gu?i quy?t d?nh vi?c n?m b?t hay không co h?i dó là tu?i tr? chúng ta. Thang giá tr? s?ng b? d?o l?n thì chúng ta ph?i l?p l?i. Khi phong bì tràn ng?p công s?, d? b? vào c? gi?ng du?ng và b?nh vi?n, thì l?p tr? chúng ta cùng si?t tay, d?n du?i t? n?n d?n t?n cùng."

It rather goes downhill from there, but again, any ordinary human would be able to detect this as spam, and an email provider as big as Microsoft Hotmail really ought not to have problems with it.

Hotmail also failed to recognise a known spam service provider, Lemuel Q Turner <ClevelandLidia@aera.net> who offered me marketing services to the US medical community, with a couple of sample deals:

Physicians: 700 thousand doctors in the US. Data is provided in Excel format and sortable by state or specialty. Over a dozen different fields and more than 30 specialties. Individual Cost: $349

Hospital Admins: 23 thousand in all with data for the CEO, CFO, CIO, COO and more Individual Cost: $220

Again, you can't believe that a functioning spam filter would let this junk through. But it did.

OK, you'll have got the message. It's clear that Hotmail is doing its duty to deliver emails to people, if there's any possibility at all that they might be legitimate. It's taking the view that if it filters too strictly, people will get on its case for filtering out legitimate business communications, and setting its target high enough that only the most obvious spam will get trapped.

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.