Browse Definitions :
Definition

spim (instant messaging spam)

Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging. Although less ubiquitous than its e-mail counterpart, spim is reaching more users all the time. According to a report from Ferris Research, 500 million IM spam were sent in 2003, twice the level of 2002. As it becomes more prevalent, spim could impact the business community similarly to the way that spam does now, by consuming corporate resources and creating security problems.

In some ways, IM is an especially useful channel for spammers. For one thing, the immediacy of IM makes users more likely to reflexively click links. Furthermore, because it bypasses anti-virus software and firewalls, IM is an easy means of passing on not only commercial messages, but also viruses and other malware. Meanwhile, government, corporations, and ISPs are united in the fight against spam, with proposed solutions such as e-mail postage and legislation such as the Can-Spam Act of 2003. As anti-spam measures for e-mail are more widely implemented and become more effective, frustrated spammers may increasingly turn to spim.

One way to protect yourself from spim is to block messages from anyone not your buddy list, or to allow messages only from those on a permission list. Here's how to do that in some of the popular IM programs:

  • In the AOL IM program window, select "preferences" on the bottom left hand side. In the Preferences window, elect the "Privacy" category from the list on the left-hand side, and then choose from the options available, such as "Allow only users on my Buddy list."
  • In the Yahoo IM window, under "Login," select "Privacy Settings," and then select "Ignore anyone who is not on my Friends list."
  • In the MSN Messenger window, under "Tools," select "Options," and then click the "Privacy" tab. Click the box by "Only people on my Allow List can see my status and send me messages."
This was last updated in September 2005

Continue Reading About spim (instant messaging spam)

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close