Email is a software system used to send, store, receive and forward text messages and attachments over a computer network. An email blast refers to a large amount of email being sent out at once, while an email bomb is a type of Denial of Service (DOS) attack aimed at compromising a person’s or organization’s email capability. There are two general types of email bombs: one overwhelms the system with a huge number of emails, while the other adds the target’s email to a large number of mailing lists.
Email, or e-mail, short for electronic mail, is a software system developed from a system that originated in the 1960s. E-mail is used to send, store, receive and forward text messages, and often attachments, over a packet-based computer network. Several terms for particular approaches to email have earned themselves metaphorical nicknames. Two of these are email blast and email bomb. While these two terms similarly conjure the image of an explosion, they actually have quite different meanings.
An email blast simply refers to a large amount of email being sent out at once. An email blast can be spam or an entirely legitimate business, depending on the circumstances. If the email is sending the email to users who have not opted in to be on a mailing list, or otherwise violating the 2003 Controlling the Assault of Non-Solicited Pornography And Marketing (CANSPAM) Act, then email blast will be considered spam. If the emailer is simply sending a very large number of emails to users whose addresses he legitimately obtained and, for example, offers a coupon or information about an upcoming sale, the email blast could be perfectly legitimate. An email bomb, on the other hand, despite its similar name, has no legitimate use.
An email bomb is a type of Denial of Service (DOS) attack. A DOS attack is an attempt to destroy a person’s or organization’s access to a particular resource or service. It may be aimed at overloading a network, disrupting communication between a user’s computer and its server, attempting to disrupt the general service of the targeted person or organization, or attempting to prevent a person or organization from accessing a particular service. An email bomb is an example of the final type, specifically aimed at compromising a person’s or organization’s email capability.
There are two general types of email bombs. In the first type of email bomb, a person or organization is bombarded with a huge number of emails sent to the relevant email address, overwhelming the system. In the second type of email bomb, called an email subscription bomb, the target’s email is added to a large number of mailing lists, which are chosen because they send out more messages on a daily basis. The email bombardment can hit even those beyond the target, given enough traffic. If you can determine the origin of the email bomb, you can set up a router to block the attack and at least contact your Internet Service Provider (ISP).
Protect your devices with Threat Protection by NordVPN