Blog

Uploading your address book to social media

I am one of the moderators of a discussion list working on a document about getting off blocklists. If anyone not on the list attempts to post to the list I get a moderation request. One came through while I was gone. Now, I don’t really think Jim Mills wants to be friends with a mailing list. I think he probably gave LinkedIn his email password and LinkedIn went through and scraped...

Seedy underworld

ESPs have to deal with spammers, phishers and scammers getting onto their networks. Mailgun talks about some of the things they’ve found our about these problem customers.

Thanks, Al

A giant, very public thank you to Al for volunteering to mind the blog while Steve and I made an emergency trip to the UK. There was once or twice I noticed something that I thought “I should take a second and blog about this” only to discover Al was way ahead of me and had already posted it. Both of us picked up some sort of ugly cold while we were there so it will be a couple days...

Auto-opt-in?

Bronto’s Chris Kolbenschlag frames the discussion well: He purchased from an online retailer, they assumed he wanted to receive followup emails, and thus, those emails did eventually commence. This is something I’ve had a lot of experience with. Working for an e-commerce service provider from later 2000 through mid 2006, I was the guy setting permission policy, dealing with spam...

The FBI in my Inbox?

It’s alarming to read that, depending on whom you believe, the FBI feels it has the legal right to access your email messages without having to obtain a search warrant. I know I don’t have anything particularly damning in my personal email account, but it’s the principle of the matter that’s the problem. (And consider errors and leaks. Nothing in my email inbox is going to...

Get reading for SMiShing?

I received my first phishing attempt via text message today. Apparently that’s called SMiShing, and it’s a thing. Sadly, I’m too busy to have the guy follow up with his promised phone call to try to get my Gmail password from me, but I did take a moment and report it to 7726, just in case that’ll do good to help protect somebody else in the future. Also, apparently I have...

Image Hosting on a Different Domain?

Fridays are a busy day in the land of deliverability, so I don’t have a lot of time to come up with a specific post for today. But, I thought this might interest folks here — the other day, a client asked me about using CDNs (content delivery networks) to host HTML email content, and I blogged up a quick reply over on my work blog.
(It’s true! Fridays are the new Mondays.)

Spams, Scams, and Senders

Over on the Magill Report, Stephanie Colleton from Return Path shares her thoughts on how to tell whether or not an email message is legitimate. Let’s add to that some more thoughts from Return Path’s Lauren Soares. Then let’s add to that some of my own thoughts specifically for email senders. Every company sending email today ought to: Use DKIM Authentication. It’s not...

Pump-and-dump Spam is Back!

Commtouch’s latest “Internet Threats Trend Report” suggests that penny stock spam has returned: Pump and dump spam, also known as penny stock spam, one of the most popular topics among spammers between 2006 and 2008, made a forceful comeback in Q1 after having all but disappeared in previous years. In March 2013, pump and dump spam dominated the list of spam topics. Eighteen...

AOL Updates Spam Filtering

Over on the AOL Postmaster blog, Lili Crowley announced yesterday that AOL has made changes to their spam filtering system. Specifically, more senders may be subject to blocking with CON:B1 errors. AOL’s website explains that CON:B1 errors indicate that an IP address is being  blocked “due to a spike in unfavorable e-mail statistics.” This strongly suggests that a sender blocked...

Recent Posts

Archives

Follow Us