·

The best form of defense for network abuse teams is to “know your enemy”. You need to get into the...

·

There are many things that can be said about spammers and their messages. What began as the electronic version of...

·

When the internet became accessible to the public, it quickly became obvious that the new technology had the potential to...

·

When Hormel decided to rename its economical canned luncheon meat in 1936, the company chose to call it <a class="glossaryLink"...

·

It seems that every innovative technology carries the risk of abuse. For example, when telephones became commonplace in American homes,...

·

Since options like Napster and Bittorrent first burst out onto the net, content piracy has become one of the biggest...

·

For years, content pirates have been running rampant on the web, downloading anything and everything they want for free without...

·

Abuse desks, working with customers, sorting out technical difficulties, and keeping up to date with the disparate tools while maintaining...

·

Fatigue, a concept familiar to many in the technology industry, can be defined as unrelenting exhaustion or stress that negatively...

·

How should spam traps be characterized? Do deliverability and compliance issues...

·

The 2018 State of Trust and Safety Report is already showing surprising results. One revelation has been that nearly 50%...

·

When you receive an abuse report, have you ever asked yourself; what should the entire lifecycle of the report takedown...