Is CentMail vulnerable to spammers who have zombie networks at their disposal?
Zombie networks typically rely on being able to compromise computers undetected, to relay spam as a background process. With CentMail they would have to not only execute code on their host machines but steal users’ CentMail credentials and deplete their balances. This type of attack is harder for spammers and, since CentMail generates an audit trail of stamp requests, more easily detectable. See also Question 16.
Related Questions
- Convergence of voice and data networks can make communications more vulnerable (single point of failure - SPF, opens voice to data network security issues); what can be done about that?
- Is CentMail vulnerable to spammers who have zombie networks at their disposal?
- How Many Wireless Networks Are Still Vulnerable to Hackers?