Feeds

Spamhaus debuts whitelist service

Invite only list aims to ease junk mail filtering workload

Securing Web Applications Made Simple and Scalable

Anti-spam researchers at the Spamhaus Project have introduced a whitelist of known benign internet mail servers.

The approach sits alongside Spamhaus' well-established blacklist of bad mail servers to make it easier for mail server operators to filter junk from incoming email traffic. Qualified corporations such as banks, law firms, airlines, medical centers and government agencies, and transactional email from automated billing systems, ecommerce servers, online banking and booking systems are all candidates for the whitelist.

Using a whitelist in addition to filtering email traffic by content places a lower performance overhead on spam filters. It also makes it less likely legitimate transaction-related emails or the like will be marked as spam by scoring systems, content filters, local "blacklists" or poor filtering choices. For email senders, the technology makes it far less likely that important emails will either be delayed or classified as junk.

The Spamhaus Whitelist was launched as a beta with inclusion on the list being invitation only, from someone who already has a whitelist account. Whitelist account holders "are chosen by others who trust them; you cannot simply apply," according to Spamhaus.

Spamhaus is reserving the right to revoke whitelist status for any email etiquette transgressions, such as the distribution of bulk mail of any type. The whitelist will be maintained in both IP addresses and domain name forms as two separate, but matched, lists. Controls mean no domain or IP address that is on the Spamhaus Project blocklist can ever be whitelisted.

More information on the whitelist can be found from Spamhaus here. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.