Wiki Reek-y Havoc

The Vandals are coming! And this time they're after your wallets.

It's a new form of insidious spam and like its inbred email cousin, it's staggeringly stupid.

People are vandalizing "Wikis" in an attempt to get free advertising for their business.

First, what's a wiki?

If you're not familiar with this little web phenomenon, you should immediately dig in and learn. "Wiki" (pronounced "wee kee") is Hawaiian for "quick." And quick it is. The word is used on the web for a page that *anyone* can edit.

When I first heard of this concept I immediately thought "there is no way it will work - it will be utter chaos" but the mass proliferation of wikis and their clear success have proven me wrong.

The medium lends itself to some amazing ideas. For example, the "wikipedia" project is an online encyclopedia that anyone can edit. It's surprisingly accurate and useful.

Alas, as with all great things on the Internet, there are forces out there ready and willing to muck it up for everyone.

A "wiki vandal" is someone who goes to a wiki and posts erroneous information. Sometimes this is for fun (like posting your boss's phone number and sexual habits under a wiki entry about "bondage" - hehe), sometimes it's for damage (like totally erasing an entry just because you are bitter about life), and sometimes it's for advertising (like editing an entry with links to your bazillion dollar business "op*ortunity").

Luckily, there are people out there watching the wikis who will change erroneous information quickly. However, sometimes the vandalism is hard to catch and it sticks.

Now, if the wiki vandals were smart, they'd create a relevant encyclopedia entry about themselves and link to it from other wiki entries.

Do it relevantly and intelligently enough and it may just stick and bring you some appropriate attention.

But, of course, we're talking about spammers here, and there is already an encyclopedia entry for "Down's Syndrome."

Copyright 2004 Val Halla

About The Author

Val Halla researches Internet Marketing Oddities. You can be alerted when she discovers something odd enough and important enough to merit your attention when you visit her site: http://www.webgodessvalhalla.com. She may be reached at: http://www.webgodessvalhalla.com

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

Edating Readers

One of our Australian clients sent out a campaign using... Read More

Is Your Website Blacklisted?

A blacklist, as the name implies, is a list of... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

Did you know that there are software programs that view... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Fight Spam and Fortify Your Web Site with RSS

RSS is the answer to the Spam epidemic of the... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

Protecting Your Business From Spam

Even being as careful as possible with my email address,... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Quickly Eliminate 100% of Your Junk Email

Why do so many people think I need to take... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

The Great Spam Scam: Five Strategies To Stop Brand and Revenue Robbery

Marketers usually think of anti-spam tactics as 'how to prevent'... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

reliable maid service Winnetka ..