Spammer and hacker, two old friends

Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applica...

Full description

Bibliographic Details
Main Authors: Hayati, Pedram, Potdar, Vidyasagar
Other Authors: Okyay Kaynak
Format: Conference Paper
Published: IEEE 2009
Online Access:http://hdl.handle.net/20.500.11937/43296
_version_ 1848756651782307840
author Hayati, Pedram
Potdar, Vidyasagar
author2 Okyay Kaynak
author_facet Okyay Kaynak
Hayati, Pedram
Potdar, Vidyasagar
author_sort Hayati, Pedram
building Curtin Institutional Repository
collection Online Access
description Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applications to inject their spam content into legitimate websites, redirect users to their own campaign, misuse web users resources, and hide their footprints. In this paper, we investigate security vulnerabilities that are exploited by spammers. We explain these security vulnerabilities, list their importance and provide a scenario of how spammers can exploit them. Additionally, we discuss two possible solutions to counter problems by patching and secure software development. The result of our work highlights importance of concerning security best-practices in developing secure software which lack of that would result to demotion of website popularity, blacklisting of website and lose of users' trust.
first_indexed 2025-11-14T09:15:36Z
format Conference Paper
id curtin-20.500.11937-43296
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T09:15:36Z
publishDate 2009
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-432962022-12-09T07:12:34Z Spammer and hacker, two old friends Hayati, Pedram Potdar, Vidyasagar Okyay Kaynak Mukesh Mohania Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside web applications to inject their spam content into legitimate websites, redirect users to their own campaign, misuse web users resources, and hide their footprints. In this paper, we investigate security vulnerabilities that are exploited by spammers. We explain these security vulnerabilities, list their importance and provide a scenario of how spammers can exploit them. Additionally, we discuss two possible solutions to counter problems by patching and secure software development. The result of our work highlights importance of concerning security best-practices in developing secure software which lack of that would result to demotion of website popularity, blacklisting of website and lose of users' trust. 2009 Conference Paper http://hdl.handle.net/20.500.11937/43296 IEEE fulltext
spellingShingle Hayati, Pedram
Potdar, Vidyasagar
Spammer and hacker, two old friends
title Spammer and hacker, two old friends
title_full Spammer and hacker, two old friends
title_fullStr Spammer and hacker, two old friends
title_full_unstemmed Spammer and hacker, two old friends
title_short Spammer and hacker, two old friends
title_sort spammer and hacker, two old friends
url http://hdl.handle.net/20.500.11937/43296