Confirmed newsletter subscriptions half as likely to be blocked

Posted by   Virus Bulletin on   Sep 19, 2011

Good practice means good performance.

Newsletters that do not confirm their subscriptions are twice as likely to be blocked by spam filters as those that do, Virus Bulletin has found.

The research, in which over 500 newsletters were sent to 21 anti-spam solutions, was part of the most recent VBSpam comparative test. Unbeknownst to participating products, newsletters were divided into those which had confirmed the subscription and those which had not. The filters were twice as likely to block newsletters that did not confirm the subscription.

'Confirmed opt-in', or COI, is considered good practice in the anti-spam industry and in many countries it is illegal to send bulk email without having the subscription confirmed. Still, more than half of the newsletters in the corpus gathered for the VB test did not do so; this research now shows that this is not only bad practice, but it may also lead to bad performance.

Several of the newsletters did use other methods to ensure spammers do not subscribe to their emails, such as the use of CAPTCHAs. However, this does not prevent users from mistyping their addresses and the emails thus ending up in the wrong inbox; recent research showed that each month a very large number of emails end up in the wrong place because of typos in email addresses.

The full VBSpam report can be read by Virus Bulletin subscribers here. The report can also be bought as a standalone article ($19.95) here.

Posted on 19 September 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

New paper: Does malware based on Spectre exist?

It is likely that, by now, everyone in computer science has at least heard of the Spectre attack, and many excellent explanations of the attack already exist. But what is the likelihood of finding Spectre being exploited on Android smartphones?

More VB2018 partners announced

We are excited to announce several more companies that have partnered with VB2018.

Malware authors' continued use of stolen certificates isn't all bad news

A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors' use of stolen certificates.

Save the dates: VB2019 to take place 2-4 October 2019

Though the location will remain under wraps for a few more months, we are pleased to announce the dates for VB2019, the 29th Virus Bulletin International Conference.

Necurs update reminds us that the botnet cannot be ignored

The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.