<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: spam
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/spam</link>
  <description>CircleID - Spam</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-19T19:59:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Exploring the Impact of WHOIS Data Redaction on Unsolicited Emails]]></title>
      <link>https://circleid.com/posts/exploring&#45;the&#45;impact&#45;of&#45;whois&#45;data&#45;redaction&#45;on&#45;unsolicited&#45;emails</link>
      <guid isPermaLink="true">https://circleid.com/posts/exploring&#45;the&#45;impact&#45;of&#45;whois&#45;data&#45;redaction&#45;on&#45;unsolicited&#45;emails</guid>

      <description><![CDATA[In the digital age, personal data protection has become paramount, with regulations like the General Data Protection Regulation (GDPR) shaping global practices. One area significantly affected is the public availability of WHOIS data, a critical resource in the domain name system. WHOIS traditionally provided detailed contact information for domain registrants, but privacy measures have redacted much of this data in recent years.]]></description>
      <dc:date>2024-12-09T07:23:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Do You Need a License to Look for Spam?]]></title>
      <link>https://circleid.com/posts/20240123&#45;do&#45;you&#45;need&#45;a&#45;license&#45;to&#45;look&#45;for&#45;spam</link>
      <guid isPermaLink="true">https://circleid.com/posts/20240123&#45;do&#45;you&#45;need&#45;a&#45;license&#45;to&#45;look&#45;for&#45;spam</guid>

      <description><![CDATA[Jay Fink had an interesting little business. If you lived in California, you could give him access to your email account; he'd look through the spam folder for spam that appeared to violate the state anti-spam law and give you a spreadsheet and a file of PDFs. You could then sue the spammers, and if you won, you'd give Fink part of the money as his fee.]]></description>
      <dc:date>2024-01-23T11:19:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Standards Paywalls Fall: Everyone Benefits]]></title>
      <link>https://circleid.com/posts/20230913&#45;the&#45;standards&#45;paywalls&#45;fall&#45;everyone&#45;benefits</link>
      <guid isPermaLink="true">https://circleid.com/posts/20230913&#45;the&#45;standards&#45;paywalls&#45;fall&#45;everyone&#45;benefits</guid>

      <description><![CDATA[Yesterday -- in a unanimous decision of the US Federal Court of Appeals for the DC Circuit (CADC) in ASTM v. Public.Resource.Org --- some of the worst standards paywalls came tumbling down. The court definitively determined that where governmental authorities incorporate private organisation technical standards into law by reference, non-commercial dissemination of those standards "constitutes fair use and cannot support liability for copyright infringement."]]></description>
      <dc:date>2023-09-13T17:37:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Spam Filtering and Social Media Moderation Are the Same Thing]]></title>
      <link>https://circleid.com/posts/20230324&#45;spam&#45;filtering&#45;and&#45;social&#45;media&#45;moderation&#45;are&#45;the&#45;same&#45;thing</link>
      <guid isPermaLink="true">https://circleid.com/posts/20230324&#45;spam&#45;filtering&#45;and&#45;social&#45;media&#45;moderation&#45;are&#45;the&#45;same&#45;thing</guid>

      <description><![CDATA[CDA Section 230 has been called "The 26 Words that Created the Internet". While it is obvious how Sec 230 protects the World Wide Web, it is equally important for e-mail. A recent Pennsylvania court case emphasizes this point. Dr. Thomas, a professor at the University of Pennsylvania, forwarded an article about another professor Dr. Monge to an online e-mail discussion list. Dr. Monge claimed the article was defamatory and sued Dr. Thomas, the university, and many others.]]></description>
      <dc:date>2023-03-24T10:06:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Hijacked IP Addresses]]></title>
      <link>https://circleid.com/posts/20220920&#45;hijacked&#45;ip&#45;addresses</link>
      <guid isPermaLink="true">https://circleid.com/posts/20220920&#45;hijacked&#45;ip&#45;addresses</guid>

      <description><![CDATA[From time to time, a party can get out of control. Raucous celebration can become careless, even destructive. Combine a critical number of young people, a certain amount of beer and lots of music and damage often happens. Partygoers leave a mess behind them. The same thing happens to some IP addresses. Malicious actors use IP addresses properly registered to someone else.]]></description>
      <dc:date>2022-09-20T10:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Minding Your IP Address Reputation]]></title>
      <link>https://circleid.com/posts/20220427&#45;minding&#45;your&#45;ip&#45;address&#45;reputation</link>
      <guid isPermaLink="true">https://circleid.com/posts/20220427&#45;minding&#45;your&#45;ip&#45;address&#45;reputation</guid>

      <description><![CDATA[Network operators rely on guidance from IP address experts because not all IP addresses used on the Internet are the same. The "reputation" of email senders is especially important because some are malicious users of the system. But identifying "senders" based on their email addresses or the individual IP address of a user presents issues that are unnecessarily complex.]]></description>
      <dc:date>2022-04-27T09:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[JD Falk – a Decade Afterwards]]></title>
      <link>https://circleid.com/posts/20211119&#45;remembering&#45;jd&#45;falk&#45;10&#45;years&#45;later</link>
      <guid isPermaLink="true">https://circleid.com/posts/20211119&#45;remembering&#45;jd&#45;falk&#45;10&#45;years&#45;later</guid>

      <description><![CDATA[I can still hear it. ‘Hee hee’. That’s good. We all have unique laughs, but few are distinctive. Fewer yet belly the true nature of the human being issuing them. British insult comedian Jimmy Carr has one such laugh, a tri-tone ‘dah dah DUH,’ rising on the third expulsion. It has a bell-like quality, ringing, embodying the deft touch that Don Rickles had of insulting while loving, something Carr has mastered. It lets you know that despite him having just said something shocking and horrid, he is laughing with, never at, reassuring the target, ‘all is well.’]]></description>
      <dc:date>2021-11-20T06:51:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Exposing an Active Kaseya Ransomware Attack Infrastructure]]></title>
      <link>https://circleid.com/posts/20211103&#45;exposing&#45;an&#45;active&#45;kaseya&#45;ransomware&#45;attack&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/20211103&#45;exposing&#45;an&#45;active&#45;kaseya&#45;ransomware&#45;attack&#45;infrastructure</guid>

      <description><![CDATA[Kaseya, an IT solution developer targeting managed service providers (MSPs) and enterprises, became a victim of a massive ransomware attack last July. While the company’s CEO said that less than 0.1% of its clients were affected, the fact that it mostly served MSPs, the data belonging to as many as 1,500 small businesses could have been compromised.]]></description>
      <dc:date>2021-11-03T09:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[WhoisXML API Enriches Its DNS Database Download Capabilities]]></title>
      <link>https://circleid.com/posts/20210702&#45;whoisxml&#45;api&#45;enriches&#45;its&#45;dns&#45;database&#45;download&#45;capabilities</link>
      <guid isPermaLink="true">https://circleid.com/posts/20210702&#45;whoisxml&#45;api&#45;enriches&#45;its&#45;dns&#45;database&#45;download&#45;capabilities</guid>

      <description><![CDATA[WhoisXML API's repository of historical Domain Name System (DNS) lookup records continues to grow in volume and coverage. The DNS database download service has recently been expanded to now include six types of DNS databases.]]></description>
      <dc:date>2021-07-03T00:41:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Given a Malicious Email Address, What Can You Discover with Maltego&#8217;s WhoisXML API Transforms?]]></title>
      <link>https://circleid.com/posts/20210520&#45;malicious&#45;email&#45;address&#45;what&#45;you&#45;discover&#45;with&#45;maltegos&#45;whoisxml</link>
      <guid isPermaLink="true">https://circleid.com/posts/20210520&#45;malicious&#45;email&#45;address&#45;what&#45;you&#45;discover&#45;with&#45;maltegos&#45;whoisxml</guid>

      <description><![CDATA[On any given day, most of us get more emails that we won't read than those that we would. Many of these messages will remain unread and sent to the trash. There comes the third category of emails: Those we wished we hadn't read and acted upon because they are bound to be malicious, sent by cybercriminals trying to lure you into one of their scams.]]></description>
      <dc:date>2021-05-21T01:08:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Reverse IP Lookup API Can Help Detect Connected Domains]]></title>
      <link>https://circleid.com/posts/20210412&#45;how&#45;reverse&#45;ip&#45;lookup&#45;api&#45;can&#45;help&#45;detect&#45;connected&#45;domains</link>
      <guid isPermaLink="true">https://circleid.com/posts/20210412&#45;how&#45;reverse&#45;ip&#45;lookup&#45;api&#45;can&#45;help&#45;detect&#45;connected&#45;domains</guid>

      <description><![CDATA[In 2020, reports say 94% of malware were delivered via email. Phishing remains a threat, as it accounts for more than 80% of security incidents that can cost victims almost US$18,000 per minute.]]></description>
      <dc:date>2021-04-12T17:23:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Attack Surface Monitoring: Two Ways to Detect Phishing Subdomains]]></title>
      <link>https://circleid.com/posts/20201009&#45;attack&#45;surface&#45;monitoring&#45;ways&#45;to&#45;detect&#45;phishing&#45;subdomains</link>
      <guid isPermaLink="true">https://circleid.com/posts/20201009&#45;attack&#45;surface&#45;monitoring&#45;ways&#45;to&#45;detect&#45;phishing&#45;subdomains</guid>

      <description><![CDATA[Phishing attacks' success can be partially attributed to threat actors' use of branded domain names, including both legitimate and misspelled variants. It's no wonder, therefore, that blacklisting sites like PhishTank provide users a way to search phishing URLs by target brand.]]></description>
      <dc:date>2020-10-09T15:54:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[IP Blacklist and Blacklist Removal]]></title>
      <link>https://circleid.com/posts/20200826&#45;ip&#45;blacklist&#45;and&#45;blacklist&#45;removal</link>
      <guid isPermaLink="true">https://circleid.com/posts/20200826&#45;ip&#45;blacklist&#45;and&#45;blacklist&#45;removal</guid>

      <description><![CDATA[Everyone hates spam. Even worse is malware - something that infects your computer and sends spam out to you and others or tries to hack into systems. In response to these problems, many people began to maintain lists recording who generates spam and malware.]]></description>
      <dc:date>2020-08-26T20:03:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Received a Questionable Email From NABP? It May Be Illegal Spoofing]]></title>
      <link>https://circleid.com/posts/20200818&#45;received&#45;a&#45;questionable&#45;email&#45;from&#45;nabp&#45;it&#45;may&#45;be&#45;illegal&#45;spoofing</link>
      <guid isPermaLink="true">https://circleid.com/posts/20200818&#45;received&#45;a&#45;questionable&#45;email&#45;from&#45;nabp&#45;it&#45;may&#45;be&#45;illegal&#45;spoofing</guid>

      <description><![CDATA[Has your organization recently received an email claiming to be from NABP's Internet Drug Outlet Identification Program (IDOI)? If so, it is possible that someone is trying to trick you. The NABP IDOI team's email account has recently been illegally "spoofed" by unaffiliated persons or organizations. Email spoofing involves the forgery of an email header so that the email appears to have originated from someone other than the actual source.]]></description>
      <dc:date>2020-08-18T17:43:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Measuring Abuse: How Much COVID-Related Abuse Is There, Really?]]></title>
      <link>https://circleid.com/posts/20200430&#45;measuring&#45;abuse&#45;how&#45;much&#45;covid&#45;related&#45;abuse&#45;is&#45;there</link>
      <guid isPermaLink="true">https://circleid.com/posts/20200430&#45;measuring&#45;abuse&#45;how&#45;much&#45;covid&#45;related&#45;abuse&#45;is&#45;there</guid>

      <description><![CDATA[Like measuring COVID's impact, so too measuring the impact of COVID-related abuse on the Internet is difficult, there are those that would foolishly dismiss the danger entirely, others over-state the problem, perhaps to prompt sales of tools and services. The amount and type of abuse varies from network to network, and to declare everything is fine based on one world-view you believe to be ubiquitous, or that the sky is falling based upon another, extrapolated to 'everybody else' is simply poor analysis.]]></description>
      <dc:date>2020-04-30T13:52:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>