Abstract:
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towa...Show MoreMetadata
Abstract:
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside Web applications to inject their spam content into legitimate Web sites, redirect users to their own campaign, misuse Web users resources, and hide their footprints. In this paper, we investigate security vulnerabilities that are exploited by spammers. We explain these security vulnerabilities, list their importance and provide a scenario of how spammers can exploit them. Additionally, we discuss two possible solutions to counter problems by patching and secure software development. The result of our work highlights importance of concerning security best-practices in developing secure software which lack of that would result to demotion of Web site popularity, blacklisting of Web site and lose of userspsila trust.
Date of Conference: 01-03 June 2009
Date Added to IEEE Xplore: 02 October 2009
ISBN Information: