Here it is; the definitive page at Spam Resource, where I line up everything I have to share about list growth. The next person that asks me how to grow their list will be direct…
Let's talk about Dan Balsam, lawyer turned anti-spam crusader . I've been glibly telling friends and colleagues that this guy is my hero, but Venkat Balasubramani rightl…
As the Detroit Free Press reported, a Michigan resident faces felony hacking charges for accessing his wife's email account sans her consent. Is this a case of a good deed g…
Marcel Lohmann, one of the admins behind the NiX Spam DNSBL , reached out to me to ask me if I would review this DNSBL. I haven't published any new blacklist reviews in a cou…
AOL hasn't yet mentioned this on their Postmaster Blog , but multiple sources are reporting that AOL's MX records temporarily vanished overnight. It's not clear how l…
As I have talked about before, backscatter is an annoying menace . Backscatter messages are sort of "ghost" bounces that come back to you, from sites that you've ne…
Steve Linford of well-respected anti-spam group Spamhaus reports that Spamhaus is currently under DDoS attack by a pro-Wikileaks group. He has asked that the following informatio…
Engadget reports that "the Sixth Circuit Court of Appeals ruled [on Monday] that the government must have a search warrant before it can obtain email from your provider. Spe…
CAUCE Reports: "It’s been a long time coming, but Canada has an anti-spam law, and one, which sets a new world standard, and a tough, but fair, opt-in protocol for everyone …
Spamhaus is warning that Wikileaks is redirecting web visitors to a mirror site hosted in "blackhat" network space that is currently listed on the Spamhaus SBL, and, as…
Today, Return Path posted a short but very helpful set of guidelines that one should keep in mind when operating a DNSBL anti-spam blacklist . It's a must read.
Last week I shared a number of excellent list building tips from Andrew Kordek of Trendline Interactive . (Thanks again for that insight, Andrew!) Today, I'd like to share …
Mark Brownlow over on Email Marketing Reports: In addition to expertly recapping the recent discussions surrounding permission versus relevance, opt-in versus opt-out, Mark adds …
Sharon writes, "How do I build a list from scratch as a new company? Should I get someone to harvest them by hand so they are super targeted? Yes, I understand that spamming…
A friend asked me the other day, what exactly is bulletproof hosting? Laura Atkins has complained before, on this very blog , that Google is a bulletproof hosting provider. Googl…
Peter Seebach reports on spam he received from Netprospex , and how their lists might not be as "verified" as claimed. (Also note my previous post on bad advice from Ne…
My old friend Mike Horwath previously shared with us his experience with Newegg sending him spam. Now he's letting us know that one of his employees is also receiving spam …
I had another thought today about Gretchen Scheiman's recent MediaPost article . (You can read my thoughts from yesterday here .) In Mickey Chandler's follow-up post , G…
Gretchen Scheiman of OgilvyOne wrote a piece for MediaPost the other day, entitled, " Does Permission Need To Be Explicit? " It's an interesting read and she is mos…
I never noticed this until now, but my friend Jess Henig wrote an article for FactCheck.org all the way back in 2008, talking about how forwarded emails filled with lies and balo…
In addition to my own post mentioning the lawsuit , a number of other wise folks have commented on the Holomax lawsuit(s) against Microsoft and friends. None of whom seem to thin…
Laura Atkins beat me to it, writing about this new MarketingSherpa case study wherein a company decimated their list and actually grew revenue. Go read her taken on it over at th…
From TechEye.net: [Email sender Holomaxx is alleging that] “Microsoft knowingly relies on faulty automated filters and equally faulty third party information to identify purporte…
Here are quick links to all four posts in my past three part series (uh, what?) on CAN-SPAM Myths. CAN-SPAM Myth #1: Applies Only to Spam CAN-SPAM Myth #2: This Law Makes it OK t…
Chad White, Research Director for Smith-Harmon, published a great post yesterday on why image rendering is important for CAN-SPAM compliance . In it, he highlights an example ema…
I just posted information on changes to DNSWL.org over on DNSBL Resource . Looks like they're moving to a for-pay model, for at least large volume queries. Can't say that…
The outbound mail servers used by Godaddy hosting customers appear to be blocklisted by the Abusive Hosts Blocking List (AHBL). Over in this Godaddy Community Forums thread , a …
What does Scott Adams think? Selling customer data like email addresses to third parties is like selling expired, rotting milk to a foreign country that has no laws against tha…
If you ask me, payday loans are a permission challenged industry, when it comes to email marketing. Companies are buying leads, selling leads, working with multiple data partners…
A reader wrote in with the following question/complaint about Senderbase.org . I'm going to post this one anonymously. The reader wrote, "I would like to request a revie…
Ken Magill, over on The Magill Report, had this to say about link blog Box of Meat : "I get a lot of story ideas from Box of Meat. It is No. 1 on my “favorites” list. It is…
In light of the various ESP-related data breaches we've seen, exposing various email lists to spammers and the world over the past couple of years, it seems this is somethin…
If you've ever received a spam email that had a bunch of random text at the bottom, text that didn't make sense or didn't relate to the rest of the email, you've …
SOPHOS.COM.FELL.FOR.A.VERY.OLD.HACK.TODAY. I guess if you haven't been around for a while, you've never noticed that there are instances in WHOIS where you might look u…
The current owner of SPAM-L , a long-time anti-spam discussion mailing list, announced on September 3rd that long-time subscriber Rich Kulawiec 's ability to participate in t…
ARF (Abuse Reporting Format), a simple specification that enables senders of email abuse reports (like, spam complaints and feedback loop reports, for example) to easily and appr…
My old friend Mike Horwath relates his tale of Newegg.com doing just about everything wrong in response to a spam complaint. Spamming him again after he contacted you, then hold…
Co-regdata.com seem to be pirating content from my own site here at Spam Resource dot com. Example stolen content: http://www.co-regdata.com/2010/08/27/ken-magill-returns-45th-…
Today's post is from Laura Atkins of Word to the Wise . She relates a frustration that I personally share: Google's seeming lack of caring about abuse emanating from thei…
I asked fellow blogger (and email expert) John Levine the following: "The Supreme Court overturned the Jaynes conviction on First Amendment grounds, yes? I'm wondering w…
I've been talking to folks a lot these past couple of days about the potential legalities around blocking unwanted spam from non-profit, political or advocacy senders. From w…
Yesterday on Twitter, somebody asked about how DNSBLs are restricted by the First Amendment to the United States Constitution . Apparently there's some advocacy group somewhe…
Yeah, you could do everything Sallie Severns recommends, or you could do this instead: Don't buy lists . There's a simple reason why: Buying lists and getting solid inbo…