Take Action Against Email Abuse

So far, this chapter has taken the Aikido route to spam and fraud defense: avoidance and being “like water.” Among our many techniques, we sidestep dangerous links, make email addresses slippery to spambots, and use identity management software to leave would-be keyloggers with nothing. These are useful defensive techniques, but sometimes an offensive approach to vanquishing online foes is more effective and satisfying. Some spammers can be identified and extinguished. Once discovered, phishing sites can be quickly put out of business.

Many commercial Internet sites provide readily available tools to report suspicious activity. For example, eBay and PayPal request that you forward suspected fake emails to spoof@ebay.com ...

Get Windows 8 In Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.