What is spam
Last updated: April 1, 2026
Key Facts
- Spam comprises a significant percentage of global email traffic, with some estimates suggesting over 80% of all emails are spam
- The term 'spam' originated from a 1970s Monty Python comedy sketch featuring the canned meat product being repetitively mentioned
- Spam messages often contain phishing links, malware attachments, or fraudulent offers designed to compromise security or steal money
- Email providers use advanced filtering systems, machine learning algorithms, and user reporting to identify and block spam messages
- The CAN-SPAM Act (2003) in the United States and similar laws globally regulate commercial email to protect consumers from unwanted messages
Definition and Scope
Spam is unsolicited, bulk-sent electronic communication intended to reach a large audience without recipient consent. Unlike legitimate marketing emails where users opt-in to receive messages, spam arrives uninvited. The primary goal is typically advertising products or services, though spam increasingly serves malicious purposes like phishing or spreading malware.
History and Terminology
The term 'spam' emerged from a famous 1970 Monty Python comedy sketch in which the word 'spam' was repetitively spoken to excessive and absurd degrees. As email became widespread in the 1990s and 2000s, the term was adopted for bulk, unwanted email messages. The comedic connection to repetition perfectly captured the nature of receiving hundreds of identical unsolicited emails.
Types of Spam
Spam takes multiple forms beyond traditional email:
- Email spam - Bulk commercial emails, phishing attempts, and malware distribution
- SMS spam - Unsolicited text messages with advertising or fraud attempts
- Social media spam - Automated bot messages and fake profiles sending repetitive content
- Comment spam - Automated posts on websites and forums promoting products or malicious links
- Search engine spam - Websites artificially optimized to rank highly for irrelevant searches
Security and Financial Risks
Spam represents a significant cybersecurity threat beyond simple annoyance. Phishing emails mimic legitimate organizations to trick recipients into revealing passwords, financial information, or downloading malware. Business email compromise, CEO fraud, and ransomware attacks often begin with targeted spam messages. These attacks cost individuals and organizations billions of dollars annually in fraud, recovery, and lost productivity.
Prevention and Legislation
Email providers implement sophisticated filtering using machine learning to detect spam characteristics. Users can report spam, which helps train filtering systems. Legally, the CAN-SPAM Act requires commercial emails to include unsubscribe options and accurate sender information. Similar regulations like GDPR in Europe provide stronger consumer protections by requiring explicit opt-in consent for marketing communications.
Related Questions
How do email filters identify spam?
Email filters analyze sender reputation, message content, embedded links, attachments, and user behavior patterns. Machine learning systems continuously learn to recognize spam characteristics, while users reporting messages provide feedback to improve accuracy.
What is the difference between spam and phishing?
Spam is bulk unsolicited messaging, while phishing is a targeted social engineering attack impersonating legitimate organizations to steal credentials. Phishing emails are typically more personalized and malicious, whereas spam is often generic advertising.
Why do I still receive spam despite filtering?
Spammers continuously adapt tactics to bypass filters, using new sender addresses, disguising content, and exploiting legitimate email services. Filters cannot catch every spam message, and some compromised email addresses perpetuate spam distribution.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Email SpamCC-BY-SA-4.0
- Cybersecurity and Infrastructure Security Agency - Phishing ResourcesPublic Domain
- Federal Communications Commission - Consumer Complaint CenterPublic Domain