103 Results for:SPAM

  • Sort by: 

spam trap

A spam trap is an email address that is used to identify and monitor spam email. Read Full Definition

backscatter spam

Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs ... Read Full Definition

SMS spam (cell phone spam or short messaging service spam)

SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been ... Read Full Definition

email spam

Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. Read Full Definition

spam filter

A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox. Read Full Definition

spambot

A spambot is an automated system that sends unwanted, unsolicited messages to users, known as spam. Read Full Definition

greylist (or graylist)

A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam. If a message arrives from an address or domain on the list, it will be ... Read Full Definition

Associated Glossaries

Microsoft Exchange Online Protection (EOP)

Microsoft Exchange Online Protection (EOP) is a cloud-based service that provides email filtering designed to protect organizations against spam, malware, and other email-based threats. Read Full Definition

Associated Glossaries

messaging security

Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's communication infrastructure. Read Full Definition

Associated Glossaries

whitelist (allowlist)

A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others. Read Full Definition