{"id":148,"date":"2006-05-22T14:42:41","date_gmt":"2006-05-22T18:42:41","guid":{"rendered":"http:\/\/clay.blogdns.net\/?p=148"},"modified":"2006-05-22T14:42:41","modified_gmt":"2006-05-22T18:42:41","slug":"blue-security-quits-antispam-biz","status":"publish","type":"post","link":"https:\/\/claymccauley.info\/index.php\/2006\/05\/22\/blue-security-quits-antispam-biz\/","title":{"rendered":"Blue Security quits antispam biz"},"content":{"rendered":"<p><a href=\"http:\/\/www.securityfocus.com\/news\/11392?ref=rss\">Blue Security folds under spammer&#8217;s wrath<\/a><\/p>\n<p>Blue Security, the antispam service that automatically sent opt-out messages for its subscribers shutdown it&#8217;s service as it&#8217;s battle with the internet&#8217;s criminal underground escalated.  What this highlights is the raw power held by internet criminals and the botnets they control.  I think this is an example of why security professionals should avoid a direct response to internet attacks and rather use logging and filtering techniques.  Instead of making yourself a target, you&#8217;ll block most of the harmful effects while at the same time gathering information on the attack that can be useful in prosecuting the offenders.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blue Security folds under spammer&#8217;s wrath Blue Security, the antispam service that automatically sent opt-out messages for its subscribers shutdown it&#8217;s service as it&#8217;s battle with the internet&#8217;s criminal underground escalated. What this highlights is the raw power held by &hellip; <a href=\"https:\/\/claymccauley.info\/index.php\/2006\/05\/22\/blue-security-quits-antispam-biz\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-148","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":0,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"wp:attachment":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}