際際滷

際際滷Share a Scribd company logo
Spam TV: Coming soon to a popular Web 2.0 video site near you
Web 1.0 In the beginning, we had email
Web 1.0 Then, we had unsolicited email. Commonly known as spam
油
Web 2.0 In the beginning, we had sites where  anybody  could comment on anything, share anything, and upload anything to their hearts desire.  http://en.wikipedia.org/wiki/User-generated_content
Web 2.0 Then, came
Web 2.0 Then, came
Web 2.0 Then, came
Spam 2.0 Now, in audio and video!
Websense ThreatSeeker Network detected this scouring the blogosphere for malicious content
Spam as a business: win/loss ratio To land just 28 sales of various male-enhancement products, spammers had to send 350 million spam See Univ. Calif. San Diego research for more info: http://www.cs.ucsd.edu/~savage/papers/CCS08Conversion.pdf
Dont be that 1 out of 28 who subjects 350 million others to spam!
Ad

Recommended

Thewww
Thewww
Melissa Davis
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
Moss Adams 2007 Personal Financial Planning Practice Study
Moss Adams 2007 Personal Financial Planning Practice Study
hilldor
Research paper powerpoint presentation for public viewing
Research paper powerpoint presentation for public viewing
Knuckles McGuire
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
The Love Bug or the so-called 'Iloveyou virus'
The Love Bug or the so-called 'Iloveyou virus'
johannesgetu60
Ransomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
radhika.pdf
radhika.pdf
dharmendra321361
Living In Hi-Tech, Hi-Touch World
Living In Hi-Tech, Hi-Touch World
Cheryl Engle
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Jaskaran Narula
The Internet
The Internet
Hugo Antonio
Features Of The Internet
Features Of The Internet
kimromero
Information Security - A Discussion
Information Security - A Discussion
Kaushik Patra
The malware effects
The malware effects
Viral Parmar
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
Computer Worms
Computer Worms
sadique_ghitm
What is a virus and anti virus
What is a virus and anti virus
Leonor Costa
ppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
Today's malware aint what you think
Today's malware aint what you think
Nathan Winters
Cyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
Video in a Web 2.0 World
Video in a Web 2.0 World
Religion Communicators Council
0926182320 Sophos[1]
0926182320 Sophos[1]
guest043f27
WhatS All The Buzzafsme
WhatS All The Buzzafsme
Michael Amick
Web 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
Mike Thornburg
How spam change the world
How spam change the world
Farhaan Bukhsh
Kushagra comp ppt.pptx
Kushagra comp ppt.pptx
KushagraPal5
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D

More Related Content

Similar to Spam TV (20)

When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
radhika.pdf
radhika.pdf
dharmendra321361
Living In Hi-Tech, Hi-Touch World
Living In Hi-Tech, Hi-Touch World
Cheryl Engle
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Jaskaran Narula
The Internet
The Internet
Hugo Antonio
Features Of The Internet
Features Of The Internet
kimromero
Information Security - A Discussion
Information Security - A Discussion
Kaushik Patra
The malware effects
The malware effects
Viral Parmar
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
Computer Worms
Computer Worms
sadique_ghitm
What is a virus and anti virus
What is a virus and anti virus
Leonor Costa
ppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
Today's malware aint what you think
Today's malware aint what you think
Nathan Winters
Cyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
Video in a Web 2.0 World
Video in a Web 2.0 World
Religion Communicators Council
0926182320 Sophos[1]
0926182320 Sophos[1]
guest043f27
WhatS All The Buzzafsme
WhatS All The Buzzafsme
Michael Amick
Web 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
Mike Thornburg
How spam change the world
How spam change the world
Farhaan Bukhsh
Kushagra comp ppt.pptx
Kushagra comp ppt.pptx
KushagraPal5
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
Living In Hi-Tech, Hi-Touch World
Living In Hi-Tech, Hi-Touch World
Cheryl Engle
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Jaskaran Narula
Features Of The Internet
Features Of The Internet
kimromero
Information Security - A Discussion
Information Security - A Discussion
Kaushik Patra
The malware effects
The malware effects
Viral Parmar
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
What is a virus and anti virus
What is a virus and anti virus
Leonor Costa
ppt on antivirus and computer virus
ppt on antivirus and computer virus
Naveen Goyal
Today's malware aint what you think
Today's malware aint what you think
Nathan Winters
Cyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
0926182320 Sophos[1]
0926182320 Sophos[1]
guest043f27
WhatS All The Buzzafsme
WhatS All The Buzzafsme
Michael Amick
Web 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
Mike Thornburg
How spam change the world
How spam change the world
Farhaan Bukhsh
Kushagra comp ppt.pptx
Kushagra comp ppt.pptx
KushagraPal5

Recently uploaded (20)

"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Edge AI and Vision Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Edge AI and Vision Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Ad

Spam TV

  • 1. Spam TV: Coming soon to a popular Web 2.0 video site near you
  • 2. Web 1.0 In the beginning, we had email
  • 3. Web 1.0 Then, we had unsolicited email. Commonly known as spam
  • 4.
  • 5. Web 2.0 In the beginning, we had sites where anybody could comment on anything, share anything, and upload anything to their hearts desire. http://en.wikipedia.org/wiki/User-generated_content
  • 9. Spam 2.0 Now, in audio and video!
  • 10. Websense ThreatSeeker Network detected this scouring the blogosphere for malicious content
  • 11. Spam as a business: win/loss ratio To land just 28 sales of various male-enhancement products, spammers had to send 350 million spam See Univ. Calif. San Diego research for more info: http://www.cs.ucsd.edu/~savage/papers/CCS08Conversion.pdf
  • 12. Dont be that 1 out of 28 who subjects 350 million others to spam!